Securing Tomorrow. Today.

McAfee Labs Threats Report: April 2021

In this edition, we present new findings in our traditional threat statistical categories – as well as our usual malware, sectors, and vectors – imparted in a new, enhanced digital presentation that’s more easily consumed and interpreted.

Read Blog

Featured Blogs

McAfee Labs

Lumma Stealer on the Rise: How Telegram Channels Are Fueling Malware Proliferation

Authored by: M. Authored by: M, Mohanasundaram and Neil Tyagi In today’s rapidly evolving cyber landscape, malware threats continue to...

Family Safety

Love, Trust and Text Messages in the Digital Age

Roses are red, violets are blue, but does your security matter to your loved one too? Okay, so maybe my...

Internet Security Mobile Security

Love, Relationships, and #SextRegret: It’s Time to Take Back the Web

What would you do if someone threatened to post risqué photos of you on the Internet? According to a new...

How To Guides and Tutorials

Love, Lies, and Long Flights: How to Avoid Romance Scams While Traveling This Summer 

Ah, summer. The season of sun-soaked beaches, bucket list adventures, and Instagram-worthy Aperol Spritzes. For many, it’s also a time...

Internet Security How To Guides and Tutorials

Love Bytes – How AI is shaping Modern Love

AI has made the dating scene. In a big way. Nearly one in four Americans say they’ve spiced up their...

Mobile Security Security News

Lost Your Luggage? There’s an App for That

Did you know that worldwide, 1% of all luggage was mishandled last year—a percentage that may seem small, but actually...

McAfee Labs

Looking Into the World of Ransomware Actors Reveals Some Surprises

During the preparations for our keynotes at McAfee’s recent MPOWER conference, we brainstormed a few topics we wanted to share...

Internet Security Privacy & Identity Protection

Looking Ahead to 2021: The Things We’ll Carry Forward

Looking Ahead to 2021: The Things We’ll Carry Forward Right now, I’m thinking about how my life changed in 2020....

Internet Security

Look Before You Leap: Imposter DeepSeek Software Seek Gullible Users

Authored by Aayush Tyagi and M, Mohanasundaram  *Bold = Term Defined in Appendix In this blog, we discuss how malware...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top