Featured Blogs
The Season of Back to School Scams
Authored by: Lakshya Mathur and Yashvi Shah As the Back-to-School season approaches, scammers are taking advantage of the opportunity to...
Scammers Follow the Rebranding of Twitter to X, to Distribute Malware
Authored by: Vallabh Chole and Yerko Grbic On July 23rd, 2023, Elon Musk announced that the social networking site, Twitter...
Android SpyNote attacks electric and water public utility users in Japan
Authored by Yukihiro Okutomi McAfee’s Mobile team observed a smishing campaign against Japanese Android users posing as a power and...
CLOP Ransomware exploits MOVEit software
Authored by: Abhishek Karnik and Oliver Devane You may have heard recently in the news that several organizations, including banks,...
GULoader Campaigns: A Deep Dive Analysis of a highly evasive Shellcode based loader
Authored by: Anandeshwar Unnikrishnan Stage 1: GULoader Shellcode Deployment In recent GULoader campaigns, we are seeing a rise in NSIS-based...
New Wave of SHTML Phishing Attacks
Authored By Anuradha McAfee Labs has recently observed a new wave of phishing attacks. In this wave, the attacker has...
Deconstructing Amadey’s Latest Multi-Stage Attack and Malware Distribution
Authored by By Yashvi Shah McAfee Labs have identified an increase in Wextract.exe samples, that drop a malware payload at...
HiddenAds Spread via Android Gaming Apps on Google Play
Authored by Dexter Shin Minecraft is a popular video game that can be played on a desktop or mobile. This...
Fakecalls Android Malware Abuses Legitimate Signing Key
Authored by Dexter Shin McAfee Mobile Research Team found an Android banking trojan signed with a key used by legitimate...
Extortion Fraud is Still on the Rise
Authored by Lakshya Mathur and Sriram P McAfee Intelligence observed a huge spike in extortion email frauds over the past month....