Featured Blogs
Netflix Phishing Scam Lures Users Into Calling Fake Tech Support
A group of scammers seem to have taken to heart the lesson bequeathed to us by Three Dog Night in...
Nemty Ransomware – Learning by Doing
Executive Summary The McAfee Advanced Threat Research Team (ATR) observed a new ransomware family named ‘Nemty’ on 20 August 2019....
Necurs, Zbot Use Obfuscated Windows XP Detection to Bypass Analysis
This blog was written by Sanchit Karve. McAfee Labs has recently come across a number of malware samples that drop...
Necurs Botnet Leads the World in Sending Spam Traffic
In Q4 2017 we found that the Necurs and Gamut botnets comprised 97% of spam botnet traffic. (See the McAfee...
Navigating Today’s Connected World
Whether we’re with our romantic partners or members of our family, our devices are not far behind. In fact, staying...
Navigating cybersecurity challenges in the early days of Agentic AI
As we continue to evolve the field of AI, a new branch that has been accelerating recently is Agentic AI....
Narilam Trojan Targets Iranian Financial Software
Iranian infrastructure has been on the radar of cyberattackers for a couple of years. We have already witnessed organized and...
Myth-busting Antivirus Software Assumptions
The number of new viruses grows every day. In fact, McAfee registers an average of 1.1 million new malicious programs...
Mystery Shopping Scams: What They Look Like, and How to Avoid Them
Mystery shopping can be exhilarating. It’s almost like the life of a spy, as you send secret details back to...
