Featured Blogs
Big, Hard-to-Solve Problems
Improving the Lifecycle of Threat Defense Effectiveness When a new security tool or technique is released, Version 1.0 is usually...
Beyond Clubhouse: Vulnerable Agora SDKs Still in Widespread Use
On February 17th, 2021, McAfee disclosed findings based on a 10-month long disclosure process with major video conferencing vendor Agora,...
Beware the Rapid Proliferation of Cyber-warfare Capabilities
Governments across the globe continue to invest in cyber warfare operations. Over 60 countries, a number that is rising, currently...
Beware of Impostor Android Apps Using Fake ID
Recently discovered, an Android vulnerability called Fake ID allows apps to impersonate other apps by copying their identity. Each app...
Best practices for preventing Dridex infections
Mitigating the Dridex threat at multiple levels like file, registry, url and ip address can be achieved at various layers of...
Best Practices for Adapting to a Remote Work Lifestyle
As our world continues to evolve, we have been forced to adapt accordingly. Navigating change can be difficult for many, so...
Beneath the Surface: How Hackers Turn NetSupport Against Users
NetSupport malware variants have been a persistent threat, demonstrating adaptability and evolving infection techniques. In this technical analysis, we delve...
Behind the CAPTCHA: A Clever Gateway of Malware
Authored by Yashvi Shah and Aayush Tyagi Executive summary McAfee Labs recently observed an infection chain where fake CAPTCHA pages...
Banned Chinese Qvod Lives on in Malicious Fakes
Qvod used to be a popular video player and developer in China. Due to piracy allegations and a threatened fine,...