Featured Blogs
Big, Hard-to-Solve Problems
Improving the Lifecycle of Threat Defense Effectiveness When a new security tool or technique is released, Version 1.0 is usually...
Bing.VC Hijacks Browsers Using Legitimate Applications
Browser hijackers are a type of malware that modifies a web browser’s settings without the user’s permission. Generally a browser hijacker...
Bitcoin Miners Use AutoIt-Complied Programs With Antianalysis Code
Last year, my colleague Itai Liba blogged about the association between malware and AutoIt, a very convenient environment for malware...
Blockchain Transactions Create Risks for Financial Services
This post was written by Raj Samani and Christiaan Beek of McAfee , and Shane D. Shook, PhD. Trust is...
Bogus ‘DeepSeek’ AI Installers Are Infecting Devices with Malware, Research Finds
In a digital landscape hungry for the next big thing in Artificial Intelligence, a new contender called DeepSeek recently burst...
Botnet Control Servers Span the Globe
McAfee Labs has long monitored botnet activities and their control servers as they plague the Internet. With millions of McAfee endpoints...
BRATA Keeps Sneaking into Google Play, Now Targeting USA and Spain
Recently, the McAfee Mobile Research Team uncovered several new variants of the Android malware family BRATA being distributed in Google...
Brazilian Banking Malware Hides in SQL Database
Spam is a plague that has given headaches to system administrators and users for years. A lot of spam tries...
Buran Ransomware; the Evolution of VegaLocker
McAfee’s Advanced Threat Research Team observed how a new ransomware family named ‘Buran’ appeared in May 2019. Buran works as...
Business Email Compromise Hurts Your Organization
As many workers do today, you probably get emails from your boss asking you to perform various tasks. You may...
Bypassing Microsoft’s Patch for the Sandworm Zero Day, the Root Cause
On October 21, we warned the public that a new exploitation method could bypass Microsoft’s official patch (MS14-060, KB3000869) for...
CactusTorch Fileless Threat Abuses .NET to Infect Victims
McAfee Labs has noticed a significant shift by some actors toward using trusted Windows executables, rather than external malware, to...
Call an Exorcist! My Robot’s Possessed!
Overview As part of our continued goal of helping developers provide safer products for businesses and consumers, we here at...
Can Zealous Security Cause Harm?
Good security requires balancing risks, costs, and usability. Too much or too little of each can be unhealthy and lead...
Careto Worldwide Malware Attack Unmasked
On Monday Kaspersky Labs announced the discovery of a large number of malware infections across large parts of the globe. Kaspersky...
CelebGate: a Long, Dangerous List of Celebrities
During the past few days, the media has been abuzz with the massive celebrity photo leak nicknamed CelebGate 2014. The...
Celebrating Halloween – McAfee Style
By Dawson McPherson, Talent & Communications Coordinator Two weeks ago, I stepped into the McAfee Plano office with a mixture...
Celebrating International Day of Women and Girls in Science
Advice and Insights from some of McAfee’s brightest STEM leaders This International Day of Women and Girls in Science, #TeamMcAfee...