Featured Blogs
This Week in Scams: Dating App Breaches, TikTok Data, Grubhub Extortion
This week in scams, three headlines tell the same story: attackers are getting better at manipulating people, not just breaking into...
This Week in Scams: DoorDash Breach and Fake Flight Cancellation Texts
Leading off our news on scams this week, a heads-up for DoorDash users, merchants, and Dashers too. A data breach...
This Week in Scams: Explaining the Fake Amazon Code Surge
This week in scams, the biggest threats showed up as routine security messages, viral consumer “warnings,” and AI-generated content that...
This Week in Scams: Fake Brand Messages and Account Takeovers
This week in scams, social engineering sits at the center of several major headlines, from investment platform breaches to social media account takeovers...
This Week in Scams: Fake Steaks and Debit Card Porch Pirates
We’re back with a new edition of “This Week in Scams,” a roundup of what’s current and trending in all...
This Week in Scams: Netflix Phishing and QR Code Espionage
This week in scams, attackers are leaning hard on familiar brands, everyday tools, and routine behavior to trigger fast, unthinking reactions. From fake Netflix...
This Week in Scams: New Alerts for iPhone and Android Users and a Major Google Crackdown
Welcome back to another This Week in Scams. This week, have attacks that take over Androids and iPhones, plus news that...
This Week in Scams: Petco Breach Warning, and Watch Out for Fake Federal Calls
Pets, poisoned AI search results, and a phone call that sounds like it’s coming straight from the federal government, this...
This Week in Scams: Phony AI Ads, Apple Account Takeover Attempts, and a PlayStation Scam
For this week in scams, we have fake AI-generated shopping images that could spoil your holidays, scammers use an Apple...
This World Password Day, Here’s How a Password Manager Can Simplify Your Life
Passwords: we entrust our most important data to these strings of letters, numbers, and special characters. So, we should make...
This Year at Black Hat: Danger Drones and Thermostat Ransomware
This blog was written by Bruce Snell. Last week I went to one of the few places hotter than it...
This Year in Scams: A 2025 Retrospective, and a Look Ahead at 2026
They came by phone, by text, by email, and they even weaseled their way into people’s love lives—an entire host...
Thoughts from the conference floor: securing the connected home
This blog post was written by Nick Viney. In my line of work, you read and hear a lot about...
Threat Actors Employ COM Technology in Shellcode to Evade Detection
COM (Component Object Model) is a technology in Microsoft Windows that enables software components to communicate with each other; it...
Threat Actors Taking Advantage of FTX Bankruptcy
Authored by Oliver Devane It hasn’t taken malicious actors long to take advantage of the recent bankruptcy filing of FTX,...
Threat Actors Use Encrypted Office Binary Format to Evade Detection
This blog post was written in conjunction with Xiaoning Li. Microsoft Office documents play an important role in our work...
Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack
This blog post was co-written by Michael Rea. During our monitoring of activities around the APT28 threat group, McAfee Advanced...
Threat Report: Don’t Join Blockchain Revolution Without Ensuring Security
On May 19 researchers discovered a series of vulnerabilities in the blockchain-based EOS platform that can lead to remote control...
