Other Blogs

[breadcrumb]

Featured Blogs

Life at McAfee

Don’t Stop Learning! Jeremy’s McAfee Journey

Our How I Got Here series spotlights the stories of team members who have successfully grown their careers here at McAfee. This...

McAfee Labs

Don’t Substitute CVSS for Risk: Scoring System Inflates Importance of CVE-2017-3735

This blog was co-written by Brook Schoenfield and Damian Quiroga. I am a wry observer of vulnerability announcements. CVE-2017-3735—which can...

McAfee Labs

Dopple-ganging up on Facial Recognition Systems

Co-authored with Jesse Chick, OSU Senior and Former McAfee Intern, Primary Researcher. Special thanks to Dr. Catherine Huang, McAfee Advanced...

McAfee Labs

Drive-By Downloads Attack Adobe Zero-Day Flaw

Adobe released a security advisory warning the users of a zero-day vulnerability in Adobe Flash Player Versions 10.2.152.33 and earlier....

McAfee Labs

Ease of Buying Ransomware Fuels Affiliate Program

For several weeks after we released the McAfee Labs Threats Report, May 2015, in which we discussed the topic of...

Life at McAfee

Embrace change! Chris’s McAfee Journey

In this career-journey series, Internal Audit Manager Chris shares his recent journey joining the McAfee finance team and why he...

McAfee Labs

Emerging ‘Stack Pivoting’ Exploits Bypass Common Security

[This blog was primarily written by Xiaoning Li of McAfee Labs, with assistance from Peter Szor of McAfee Labs.] In...

McAfee Labs

Emotet Downloader Trojan Returns in Force

During the past couple of days, we have seen an increase in activity from Emotet. This Trojan downloader spreads by...

McAfee Labs

Emotet Trojan Acts as Loader, Spreads Automatically

Since the middle of July, McAfee has observed new updates of the Emotet, a Trojan that was first discovered in...

McAfee Labs

Emotet’s Uncommon Approach of Masking IP Addresses

Authored By: Kiran Raj In a recent campaign of Emotet, McAfee Researchers observed a change in techniques. The Emotet maldoc...

Life at McAfee

Employees Share Stories Working in Award–Winning Cork Office

“The culture at McAfee is easy going, fun, dynamic and everyone is friendly.”—Deirdre, Project Manager The McAfee office in Cork...

McAfee Labs

ENS 10.7 Rolls Back the Curtain on Ransomware

Ransomware protection and incident response is a constant battle for IT, security engineers and analysts under normal circumstances, but with...

McAfee Labs

Evasion Techniques: Encoded JavaScript Attacks PDF Files

Last week I kicked off a series of blogs with a discussion of how an effective IPS solution can fight...

Life at McAfee

Everyday Hero: 5 Questions with McAfee Labs’ Paula Greve

iWith cybersecurity experts taking center stage this week at the Black Hat conference in Las Vegas, the world is watching...

McAfee Labs

Evolution of Android Malware: IRCBot Joins the Party

We all know how fast the smart phone market is growing. Along with it, the complexity and the numbers of...

McAfee Labs

Evolution of Malware Sandbox Evasion Tactics – A Retrospective Study

Executive Summary Malware evasion techniques are widely used to circumvent detection as well as analysis and understanding. One of the...

McAfee Labs

Examining Code Reuse Reveals Undiscovered Links Among North Korea’s Malware Families

Attacks from the online groups Lazarus, Silent Chollima, Group 123, Hidden Cobra, DarkSeoul, Blockbuster, Operation Troy, and 10 Days of Rain are believed to have come from North Korea. But how can we know with certainty?

McAfee Labs

Examining the Link Between TLD Prices and Abuse

This blog was written by Charlie Feng. Briefing Over the years, McAfee researchers have observed that certain new top-level Domains...

McAfee Labs

Examining Your Very Own Sefnit Trojan

Most malware is created for economic purposes. To name just a few of our reports and blogs on this topic,...

McAfee Labs

Experts Discuss the 2016 Verizon DBIR: June #SecChat

Cybersecurity in 2016 has been full of sensational headlines. Ransomware has shut down multiple hospitals, millions of credentials have been...

McAfee Labs

Expiro Malware Is Back and Even Harder to Remove

File infector malware adds malicious code to current files. This makes removal tricky because deleting infections results in the loss...

McAfee Labs

Exploit Kits Improve Evasion Techniques

Exploit kits are toolkits that malicious developers use to take advantage of client-side vulnerabilities, targeting web browsers and programs that...

McAfee Labs

Exploring Winrar Vulnerability (CVE-2023-38831)

Authored by Neil Tyagi On 23 August 2023, NIST disclosed a critical RCE vulnerability CVE-2023-38831. It is related to an...

McAfee Labs

Extortion Fraud is Still on the Rise

Authored by Lakshya Mathur and Sriram P  McAfee Intelligence observed a huge spike in extortion email frauds over the past month....

McAfee Labs

Facebook Bot Spreads Through Chat Messengers [Updated]

Update from Facebook: The Facebook security team been actively tracking this botnet and providing McAfee AV to the victims (via...

Life at McAfee

Facing the Fear of Public Speaking with Toastmasters

By: DaWane, Sales Director Standing in front of 800 parents and fellow students to deliver the welcome address, thoughts swirled...

Mobile Security McAfee Labs

Fake Android and iOS apps steal SMS and contacts in South Korea

Authored by Dexter Shin Most people have smartphones these days which can be used to easily search for various topics...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top