Featured Blogs
Cybercrime in the Spotlight: How Crooks Capitalize on Cultural Events
Every four years, everyone’s head around the globe turns toward the television. The Olympics, the World Cup – world events like...
Cybercriminals Actively Exploiting RDP to Target Remote Organizations
The COVID-19 pandemic has prompted many companies to enable their employees to work remotely and, in a large number of...
Cybersecurity Suffers Due to Human Resources Challenges
The cybersecurity industry is in a state of disrepair. Growing human resource problems put the efforts to secure technology at...
Darknet Markets Will Outlive AlphaBay and Hansa Takedowns
On June 20, law enforcement took over the Hansa marketplace after investigations that began in 2016. On July 5, police...
Darkshell DDOS Botnet Evolves With Variants
Darkshell is a distributed denial of service (DDoS) botnet targeting Chinese websites. It was found in 2011 and was first...
DarkSide Ransomware Victims Sold Short
Over the past week we have seen a considerable body of work focusing on DarkSide, the ransomware responsible for the...
DDoS Attacks in the Netherlands Reveal Teen Gamers on Troublesome Path
At the end of January, the Netherlands was plagued by distributed denial of service (DDoS) attacks targeting various financial institutions,...
Deconstructing Amadey’s Latest Multi-Stage Attack and Malware Distribution
Authored by By Yashvi Shah McAfee Labs have identified an increase in Wextract.exe samples, that drop a malware payload at...
Decyphering the Noise Around ‘Meltdown’ and ‘Spectre’
The McAfee Advanced Threat Research (ATR) Team has closely followed the attack techniques that have been named Meltdown and Spectre...
DEFCON – Connected Car Security
Sometime in the distant past, that thing in your driveway was a car. However, the “connected car is already the...
Delving Deeply Into a Bitcoin Botnet
Bitcoin is a virtual decentralized currency that was created in 2009 by developer Satoshi Nakamoto, who described the currency in...
Demystifying Blockchain: Sifting Through Benefits, Examples and Choices
You have likely heard that blockchain will disrupt everything from banking to retail to identity management and more. You may...
Despite Decline in Use of Adobe Flash, Vulnerabilities Will Continue to Cause Concern
This post was researched and written by Brook Schoenfield with the assistance of Tim Hux, Abhishek Karnik, Asheer Malhotra, and...
DHCP Client Remote Code Execution Vulnerability Demystified
CVE-2019-0547 CVE-2019-0547 was the first vulnerability patched by Microsoft this year. The dynamic link library, dhcpcore.dll, which is responsible for...
DHS Accelerates Information Sharing Standards Effort; McAfee to Chair Working Group
This post first appeared at Policy@Intel on March 9. In an effort to accelerate cyber information sharing, and in response...
Did You Check Your Quarantine?!
A cost-effective way to detect targeted attacks in your enterprise While it is easy to get caught up in the...
Did You Forget to Patch Your IP Camera?
IP cameras are usually “purchase, install, and don’t touch” devices. But in the current climate of cyberattacks, they now require...
Digging Into a Windows Kernel Privilege Escalation Vulnerability: CVE-2016-7255
This blog was written by Stanley Zhu. The Windows kernel privilege escalation vulnerability CVE-2016-7255 has received a lot of media...
Digging Into the Nitol DDoS Botnet
Nitol is a distributed denial of service (DDoS) botnet that seems to be small and not widely known. It mostly...
Digging Into the Sandbox-Escape Technique of the Recent PDF Exploit
As promised in our previous blog entry for the recent Adobe Reader PDF zero-day attack, we now offer more technical...
Dissecting Zeus for Android (or Is It Just SMS Spyware?)
Zeus, also known as ZBot, is one of best-known malware in the industry. The main purpose of this malware is...
Distinctive Campaign Evolution of Pikabot Malware
Authored by Anuradha and Preksha Introduction PikaBot is a malicious backdoor that has been active since early 2023. Its modular...
Do You Have Blind Spots? McAfee Welcomes Check Your Blind Spots Bus Tour
A bus, virtual reality, and conversations around inclusion. How do all these fit together? The answer: CEO Action’s Check Your...
Does Anyone Really Care About Mobile Security?
I’ve attended Mobile World Congress a number of times and it is fair to say the concept of the show...
Dofoil Downloader Update Adds XOR-, RC4-Based Encryption
This blog was written by Sanchit Karve. The Dofoil downloader (found in the wild since 2011) occasionally updates itself with...
Don’t Call Us We’ll Call You: McAfee ATR Finds Vulnerability in Agora Video SDK
The McAfee Advanced Threat Research (ATR) team is committed to uncovering security issues in both software and hardware to help...
Don’t Get Caught Offsides with These World Cup Scams
Authored by: Christy Crimmins and Oliver Devane Football (or Soccer as we call it in the U.S.) is the most...