Featured Blogs
The Rise and Risks of AI Art Apps
Authored by Fernando Ruiz The popularity of AI-based mobile applications that can create artistic images based on pictures, such as...
McAfee Teammates Share How They #EmbraceEquity This International Women’s Day
International Women’s Day is a time for us to celebrate the achievements and contributions of women at McAfee and around...
The Rising Trend of OneNote Documents for Malware delivery
Authored By Anandeshwar Unnikrishnan,Sakshi Jaiswal,Anuradha M McAfee Labs has recently observed a new Malware campaign which used malicious OneNote documents...
From Workshops to Leader Panels: A Recap of Women’s History Month at McAfee
From Workshops to Leader Panels: A Recap of Women’s History Month at McAfee March is Women’s History Month and International...
Goldoson: Privacy-invasive and Clicker Android Adware found in popular apps in South Korea
Authored by SangRyol Ryu McAfee’s Mobile Research Team discovered a software library we’ve named Goldoson, which collects lists of applications...
Extortion Fraud is Still on the Rise
Authored by Lakshya Mathur and Sriram P McAfee Intelligence observed a huge spike in extortion email frauds over the past month....
Fakecalls Android Malware Abuses Legitimate Signing Key
Authored by Dexter Shin McAfee Mobile Research Team found an Android banking trojan signed with a key used by legitimate...
HiddenAds Spread via Android Gaming Apps on Google Play
Authored by Dexter Shin Minecraft is a popular video game that can be played on a desktop or mobile. This...
Deconstructing Amadey’s Latest Multi-Stage Attack and Malware Distribution
Authored by By Yashvi Shah McAfee Labs have identified an increase in Wextract.exe samples, that drop a malware payload at...
New Wave of SHTML Phishing Attacks
Authored By Anuradha McAfee Labs has recently observed a new wave of phishing attacks. In this wave, the attacker has...
GULoader Campaigns: A Deep Dive Analysis of a highly evasive Shellcode based loader
Authored by: Anandeshwar Unnikrishnan Stage 1: GULoader Shellcode Deployment In recent GULoader campaigns, we are seeing a rise in NSIS-based...
CLOP Ransomware exploits MOVEit software
Authored by: Abhishek Karnik and Oliver Devane You may have heard recently in the news that several organizations, including banks,...
Android SpyNote attacks electric and water public utility users in Japan
Authored by Yukihiro Okutomi McAfee’s Mobile team observed a smishing campaign against Japanese Android users posing as a power and...
Scammers Follow the Rebranding of Twitter to X, to Distribute Malware
Authored by: Vallabh Chole and Yerko Grbic On July 23rd, 2023, Elon Musk announced that the social networking site, Twitter...
The Season of Back to School Scams
Authored by: Lakshya Mathur and Yashvi Shah As the Back-to-School season approaches, scammers are taking advantage of the opportunity to...
Invisible Adware: Unveiling Ad Fraud Targeting Android Users
Authored by SangRyol Ryu, McAfee Threat Researcher We live in a world where advertisements are everywhere, and it’s no surprise...
Crypto Scam: SpaceX Tokens for Sale
Authored by: Neil Tyagi Scam artists know no bounds—and that also applies to stealing your cryptocurrency. Crypto scams are like...
Peeling Back the Layers of RemcosRat Malware
Authored by Preksha Saxena McAfee labs observed a Remcos RAT campaign where malicious VBS files were delivered via phishing email....