Featured Blogs
Business Email Compromise Hurts Your Organization
As many workers do today, you probably get emails from your boss asking you to perform various tasks. You may...
Buran Ransomware; the Evolution of VegaLocker
McAfee’s Advanced Threat Research Team observed how a new ransomware family named ‘Buran’ appeared in May 2019. Buran works as...
Brazilian Banking Malware Hides in SQL Database
Spam is a plague that has given headaches to system administrators and users for years. A lot of spam tries...
BRATA Keeps Sneaking into Google Play, Now Targeting USA and Spain
Recently, the McAfee Mobile Research Team uncovered several new variants of the Android malware family BRATA being distributed in Google...
Botnet Control Servers Span the Globe
McAfee Labs has long monitored botnet activities and their control servers as they plague the Internet. With millions of McAfee endpoints...
Bogus ‘DeepSeek’ AI Installers Are Infecting Devices with Malware, Research Finds
In a digital landscape hungry for the next big thing in Artificial Intelligence, a new contender called DeepSeek recently burst...
Blockchain Transactions Create Risks for Financial Services
This post was written by Raj Samani and Christiaan Beek of McAfee , and Shane D. Shook, PhD. Trust is...
Bitcoin Miners Use AutoIt-Complied Programs With Antianalysis Code
Last year, my colleague Itai Liba blogged about the association between malware and AutoIt, a very convenient environment for malware...
Bing.VC Hijacks Browsers Using Legitimate Applications
Browser hijackers are a type of malware that modifies a web browser’s settings without the user’s permission. Generally a browser hijacker...