Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

Security News Privacy & Identity Protection

This Week in Scams: Fake Brand Messages and Account Takeovers

This week in scams, social engineering sits at the center of several major headlines, from investment platform breaches to social media account takeovers...

Security News Internet Security

This Week in Scams: Fake Steaks and Debit Card Porch Pirates

We’re back with a new edition of “This Week in Scams,” a roundup of what’s current and trending in all...

Security News Privacy & Identity Protection Mobile Security

This Week in Scams: How Jules Lost $80K in a Romance Scam

It’s Friday the 13th, but you have nothing to fear online if you’re scam-savvy and well protected. Every week, we...

Security News Internet Security Mobile Security

This Week in Scams: Netflix Phishing and QR Code Espionage

This week in scams, attackers are leaning hard on familiar brands, everyday tools, and routine behavior to trigger fast, unthinking reactions. From fake Netflix...

Security News Privacy & Identity Protection Mobile Security

This Week in Scams: New Alerts for iPhone and Android Users and a Major Google Crackdown

Welcome back to another This Week in Scams. This week,  have attacks that take over Androids and iPhones, plus news that...

Security News Internet Security Privacy & Identity Protection Mobile Security Family Safety

This Week in Scams: Petco Breach Warning, and Watch Out for Fake Federal Calls

Pets, poisoned AI search results, and a phone call that sounds like it’s coming straight from the federal government, this...

Security News Internet Security Privacy & Identity Protection Mobile Security

This Week in Scams: Phony AI Ads, Apple Account Takeover Attempts, and a PlayStation Scam

For this week in scams, we have fake AI-generated shopping images that could spoil your holidays, scammers use an Apple...

Security News Internet Security Privacy & Identity Protection Mobile Security

This Week in Scams: Pokémon Card Cons, Email Extortion, and a Viral AI Wedding Photo

This week in scams, the Pokémon Trainer pursuit to “catch ’em all” is being hijacked by criminals posting fake trading card...

Security News Mobile Security

This Week in Scams: The AI “Truman Show” Scam Draining Bank Accounts

We’re back with another roundup of must-know scams and cybersecurity news making headlines this week, including a scam that features...

Security News Internet Security Privacy & Identity Protection Mobile Security

This Week in Scams: Why That “Booking Confirmation” Message Might Be Fake

Today marks the start of Spring in the Northern Hemisphere, and with warmer weather setting in summer trips are vacation planning are starting to...

Internet Security

This World Password Day, Here’s How a Password Manager Can Simplify Your Life

Passwords: we entrust our most important data to these strings of letters, numbers, and special characters. So, we should make...

Internet Security Privacy & Identity Protection

This Year at Black Hat: Danger Drones and Thermostat Ransomware

This blog was written by Bruce Snell. Last week I went to one of the few places hotter than it...

Security News Internet Security Privacy & Identity Protection Mobile Security

This Year in Scams: A 2025 Retrospective, and a Look Ahead at 2026

They came by phone, by text, by email, and they even weaseled their way into people’s love lives—an entire host...

Internet Security Privacy & Identity Protection Mobile Security

Thoughts from the conference floor: securing the connected home

This blog post was written by Nick Viney. In my line of work, you read and hear a lot about...

McAfee Labs

Threat Actors Employ COM Technology in Shellcode to Evade Detection

COM (Component Object Model) is a technology in Microsoft Windows that enables software components to communicate with each other; it...

McAfee Labs

Threat Actors Taking Advantage of FTX Bankruptcy 

Authored by Oliver Devane  It hasn’t taken malicious actors long to take advantage of the recent bankruptcy filing of FTX,...

McAfee Labs

Threat Actors Use Encrypted Office Binary Format to Evade Detection

This blog post was written in conjunction with Xiaoning Li. Microsoft Office documents play an important role in our work...

McAfee Labs

Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack

This blog post was co-written by Michael Rea. During our monitoring of activities around the APT28 threat group, McAfee Advanced...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top