Enterprise

McAfee Threat Intelligence Exchange Aids in Saving Money and Saving Lives

For Kirk Davis, Director of Information Security at Vidant Health, tough days at work feature security events big and small. One especially tough day was when the North Carolina not-for-profit healthcare company was attacked by a Cryptowall Trojan that was able to encrypt half a million files before his team ...

Enterprise Español

Venza el reto de la seguridad de las bases de datos y asegure la continuidad

This blog was written by Victor Vásquez Cruz. El corazón de las empresas contemporáneas son las bases de datos. Si pensamos en cualquier proceso importante de una compañía encontraremos que su manejo incluye una base de datos: los inventarios de los productos; el manejo de los clientes (CRM); las listas ...

Enterprise

Financial Firm Finds Holistic Approach Through Hybrid Web Protection

The game of cat and mouse. That’s how Vince Skinner, Vice President of Security at a large, North American financial services firm, refers to his favorite aspect of his job. “I love solving problems,” he says. “I love the cat and mouse of the malicious actors and what they are ...

McAfee Labs

Patch Now: Simple Office ‘Protected View’ Bypass Could Have Big Impact

Protected View is a security feature of Microsoft Office. According to research from MWR Labs, Protected View mode is a strong application-level sandbox. In a real-world attack scenario, Office documents from the Internet, such as downloaded documents from browsers (Chrome, Edge, Internet Explorer), or attachments received on emails clients (such as ...

Enterprise

Better Malware Protection, Help for Endpoints in McAfee Web Gateway Release

Every few months, our development team releases a new version of Web Gateway software with multiple improvements they’ve been working towards in their agile development process. This time around, Web Gateway continues to evolve in the critical area of malware protection, expands its capabilities to share threat information, and more. ...

McAfee Labs

Overcoming Targeted Attacks: a New Approach

Successful targeted attacks bypass security controls and typically cause significant damage to an enterprise. Damages may include reputation, monetary, and intellectual property losses. Many attacks leverage zero-day malware, which are malicious programs that security scanners miss on the day they are used for the first time. Several approaches are commonly ...

Executive Perspectives

Vulnerable From Below: Attacking Hypervisors Using Firmware And Hardware

Malicious attacks with firmware privileges can compromise an entire system, so it is especially important to apply measures to reduce the risks. Breaking hypervisor isolation and attacking — or exploiting — neighbouring virtual machines is a prominent goal of cyber criminals. At the Black Hat USA 2015 and DEF CON ...

McAfee Labs

Threat Actors Use Encrypted Office Binary Format to Evade Detection

This blog post was written in conjunction with Xiaoning Li. Microsoft Office documents play an important role in our work and personal lives. In the last couple years, unfortunately, we have seen a number of exploits, especially some critical zero-day attacks, delivered as Office documents. Here are a couple of ...

Security Operations

Four Ways to Stretch Your SIEM For Complete Protection

This blog post was written by Karl Klaessig. Organizations and enterprises today are more aware than ever of the dangers posed by cybercriminals and advanced persistent threats (APTs). So, how can they fight back against these online threats in a situation where one size never fits all? One solution that ...

Security Operations

Why SIEM is a Winning Security Strategy

This blog post was written by Karl Klaessig. Like most things in life, successful planning for a secure network takes a pre-baked strategy. And, with that strategy comes the actions and tasks needed to carry it out. It’s much like sports – you want to enable your organization to be ...

Subscribe to McAfee Securing Tomorrow Blogs