Featured Blogs
Locky Ransomware on Rampage With JavaScript Downloader
Locky is a ransomware family that encrypts victims’ files and demands money to decrypt the files. It has infected many...
Look Before You Leap: Imposter DeepSeek Software Seek Gullible Users
Authored by Aayush Tyagi and M, Mohanasundaram *Bold = Term Defined in Appendix In this blog, we discuss how malware...
Looking Ahead to 2021: The Things We’ll Carry Forward
Looking Ahead to 2021: The Things We’ll Carry Forward Right now, I’m thinking about how my life changed in 2020....
Looking Into the World of Ransomware Actors Reveals Some Surprises
During the preparations for our keynotes at McAfee’s recent MPOWER conference, we brainstormed a few topics we wanted to share...
Lost or Stolen Mobile Devices Can Lead to Identity Theft
We lose stuff. You put something down, you get distracted, you forget about it and it’s gone. Stuff falls out...
Lost Your Luggage? There’s an App for That
Did you know that worldwide, 1% of all luggage was mishandled last year—a percentage that may seem small, but actually...
Love Bytes – How AI is shaping Modern Love
AI has made the dating scene. In a big way. Nearly one in four Americans say they’ve spiced up their...
Love, Lies, and Long Flights: How to Avoid Romance Scams While Traveling This Summer
Ah, summer. The season of sun-soaked beaches, bucket list adventures, and Instagram-worthy Aperol Spritzes. For many, it’s also a time...
Love, Relationships, and #SextRegret: It’s Time to Take Back the Web
What would you do if someone threatened to post risqué photos of you on the Internet? According to a new...
Love, Trust and Text Messages in the Digital Age
Roses are red, violets are blue, but does your security matter to your loved one too? Okay, so maybe my...
Lumma Stealer on the Rise: How Telegram Channels Are Fueling Malware Proliferation
Authored by: M. Authored by: M, Mohanasundaram and Neil Tyagi In today’s rapidly evolving cyber landscape, malware threats continue to...
Mac ‘Protector’: Another Fake-Alert in Disguise
It’s not breaking news that fake-alert Trojans infections are growing. But it’s worrying for Mac OS X users to find...
Macro Malware Adds Tricks, Uses MaxMind to Avoid Detection
Macro malware continues to evolve and use new tricks to evade detection. This threat is responsible for downloading malicious Trojans...
Macro Malware Associated With Dridex Finds New Ways to Hide
Macro malware is on the upswing and cybercriminals are always searching for new ways to deceive users and evade detection....
Macro Malware Employs Advanced Obfuscation to Avoid Detection
Attacks by macro malware carrying ransomware are growing, as we have recently reported on Blog Central here and here. Now McAfee Labs...
Macro Malware Employs Advanced Sandbox-Evasion Techniques
During the past couple of weeks, McAfee Labs has observed a new variant of macro malware. With this variant when...
Macro Malware Targets Macs
Macro malware has been spreading for years. New techniques arise all the time to hide malicious code and thus increase...
Major HTTP Vulnerability in Windows Could Lead to Wormable Exploit
Today, Microsoft released a highly critical vulnerability (CVE-2021-31166) in its web server http.sys. This product is a Windows-only HTTP server...