How Thinking Like an Attacker Makes You a Better Threat Hunter
In the race against cybercrime, like in a chess game, threat hunters are constantly trying to get one step ahead of the opponent, trying to predict what the next movement will be. Evidence suggests, however, that most organizations struggle to catch up with the pace, with their defenders (also commonly ...
‘McAfee Labs Threats Report’ Explores Malware Evasion Techniques, Digital Steganography, Password-Stealer Fareit
This blog post was written by Vincent Weafer. We got a little carried away in the McAfee Labs Threats Report:...
Misuse of DocuSign Email Addresses Leads to Phishing Campaign
DocuSign, which provides electronic signatures and digital transaction management, reported that email addresses were stolen by an unknown party on...
Mirai Botnet Creates Army of IoT Orcs
This post was based on analysis by Yashashree Gund and RaviKant Tiwari. There is a lot of speculation in the...
Best Security Practices for Dealing With the Internet of Things
The Internet of Things is growing fast. McAfee sees the market for IP-connected hardware reaching 200 billion devices by the...
Threat Report Explores Threat Intelligence Sharing & Mirai, the IoT Botnet
This blog post was written by Vincent Weafer. In the McAfee Labs Threats Report: April 2017, published today, we explore two...
McAfee Labs December Threats Report Explores Many Facets of Deception
This blog post was written by Vincent Weafer. In the McAfee Labs Threats Report: December 2016 published today, we write...
“Trojanization” of Legit Apps on the Rise
McAfee today released its McAfee Labs Threats Report: December 2016. The report’s third key topic illustrates how attackers are creating...
Do You Need to Pull Up Your SOCs?
This week’s McAfee Labs Threats Report: December 2016 revealed the results of a survey gauging the state of the security...
2016: A Year at Ransom
This week’s McAfee Labs Threats Report: December 2016 provides an overview of how ransomware has evolved over the course of 2016, and...