View All Publications

Filter Content:

Foundstone Services Targeted Malware Threat Assessment 360

Foundstone Services — part of McAfee Professional Services — offers Targeted Malware Threat Assessment 360, so your security organization can discover and respond to advanced threats that go beyond your current security monitoring tools.

Topics: Services Foundstone
services-foundstone,fiche-technique

Protecting Against WannaCry and Petya

Read our recommended policies and procedures and how McAfee products can protect systems and networks from WannaCry and Petya.

Topics: Advanced Threat Research
advanced-threat-research,présentation-de-solution

Targeted Ransomware: No Longer a Future Threat

In a new campaign of targeted ransomware attacks, hackers gained persistent access to the victims' networks through vulnerability exploitation and spread their access to any connected systems that they could.

Topics: Advanced Threat Research
advanced-threat-research,rapport

Secure Coding for Android Applications

More than one billion Android devices have been activated to date, and it’s estimate that 1.4 million devices are activated per day. The rapidly increasing popularity of this mobile OS demands that developers understand how to create secure Android applications. This white paper focuses on secure coding practices for Android applications.

Topics: Services Foundstone
services-foundstone,livre-blanc

A Pentester's Guide to Hacking ActiveMQ-Based JMS Applications

Enterprise messaging systems (EMS) are highly reliable, flexible, and scalable systems that allow asynchronous message processing between two or more applications. This paper provides guidance on penetration testing techniques to assess the security of ActiveMQ-based EMS written using the Java Message Service API.

Topics: Services Foundstone
services-foundstone,livre-blanc

Building & Maintaining a Business Continuity Program

Business continuity planning is a critical function that involves many different personnel and departments over multiple phases. As with many business continuity programs, an iterative process is most effective in developing a refined set of procedures and plans.

Topics: Services Foundstone
services-foundstone,livre-blanc

Low Hanging Fruits: The Top Five Easiest Ways to Hack or Get Hacked

How familiar are you with low-hanging fruit — the easiest ways for attackers to gain entry to your network and potentially run off with your valuable data? This white paper explores penetration tests that you can perform at your organization to gain an understanding of how to apply the proper defenses to prevent exploitation of the top five low-hanging fruit.

Topics: Services Foundstone
services-foundstone,livre-blanc

Infographic: McAfee Labs Threat Report March 2018

The McAfee Labs Threat Report: March 2018 highlights news and statistics gathered by the McAfee® Advanced Threat Research and McAfee Labs teams in Q4 of 2017. This quarter focuses on PowerShell malware, cryptocurrency mining, and increasing attacks targeting the health care sector.

Topics: McAfee Labs,Recherche sur les menaces
mcafee-labs,recherche-sur-les-menaces,présentation-graphique

2018 Threats Predictions

Learn about our threats predictions for 2018.

Topics: McAfee Labs,Recherche sur les menaces
mcafee-labs,recherche-sur-les-menaces,présentation-graphique

Infographic: McAfee Labs Threats Report–June 2016

This infographic highlights some of the trends in the June 2016 McAfee Labs Threats Report.

Topics: Recherche sur les menaces,McAfee Labs
recherche-sur-les-menaces,mcafee-labs,présentation-graphique

Threat Report September 2017 Key Findings

See a visual representation of our researchers’ key findings from the September 2017 report.

Topics: McAfee Labs,Recherche sur les menaces
mcafee-labs,recherche-sur-les-menaces,présentation-graphique

McAfee Labs Threat Report: December 2017 Infographic

See a visual representation of our key findings from the December 2017 report.

Topics: McAfee Labs,Recherche sur les menaces
mcafee-labs,recherche-sur-les-menaces,présentation-graphique

McAfee Labs Quarterly Threat Report June 2017 - Infographic

McAfee Labs researchers examine the most powerful malware evasion techniques past, present, and future; the use of digital steganography in malware; and Fareit, the most famous password stealer.

Topics: McAfee Labs,Recherche sur les menaces
mcafee-labs,recherche-sur-les-menaces,présentation-graphique

McAfee Labs Threats Report: March 2016

This infographic highlights some of the trends in the March 2016 McAfee Labs Threats Report.

Topics: McAfee Labs,Recherche sur les menaces
mcafee-labs,recherche-sur-les-menaces,présentation-graphique

Infographic: McAfee Labs Quarterly Threat Report December 2016

McAfee commissioned a primary research study to gain a deeper understanding of the ways in which enterprises are using security operations centers, how they have changed over time, and what they will look like in the future. The second Key Topic summarizes the year in ransomware. Not only was there a huge jump in the number of ransomware attacks in 2016 but we saw significant technical advancements, too. We detail some of those advancements in this story. Finally, the third Key Topic digs into Trojans that infect legitimate code and hide out, hoping to go unnoticed as long as possible to maximize payouts. We show how attackers are creating long-lasting, fully undetectable malware.

Topics: McAfee Labs,Recherche sur les menaces
mcafee-labs,recherche-sur-les-menaces,présentation-graphique

Infographic: Threat Report Key Findings

See a visual representation of our researchers’ key findings from the September 2016 report.

Topics: McAfee Labs,Recherche sur les menaces
mcafee-labs,recherche-sur-les-menaces,présentation-graphique

Threat Analysis Report (Cerber)

Download the Cerber threat analysis report from McAfee Advanced Threat Defense to learn more about the threat level, behavior classification, and file execution timeline.

Topics: McAfee Labs,Recherche sur les menaces
mcafee-labs,recherche-sur-les-menaces,rapport

Threat Analysis Report (BTC)

Download the BTCWare threat analysis report from McAfee Advanced Threat Defense to learn more about the threat level, behavior classification, and file execution timeline.

Topics: McAfee Labs,Recherche sur les menaces
mcafee-labs,recherche-sur-les-menaces,rapport

Threat Analysis Report (Fakeglobe)

Download the Fake Globe threat analysis report from McAfee Advanced Threat Defense to learn more about the threat level, behavior classification, and file execution timeline.

Topics: McAfee Labs,Recherche sur les menaces
mcafee-labs,recherche-sur-les-menaces,rapport

Threat Analysis Report (Magniber)

Download the Magniber threat analysis report from McAfee Advanced Threat Defense to learn more about the threat level, behavior classification, and file execution timeline.

Topics: McAfee Labs,Recherche sur les menaces
mcafee-labs,recherche-sur-les-menaces,rapport

Threat Analysis Report (Gradcrab)

Download the GradCrab threat analysis report from McAfee Advanced Threat Defense to learn more about the threat level, behavior classification, and file execution timeline.

Topics: McAfee Labs,Recherche sur les menaces
mcafee-labs,recherche-sur-les-menaces,rapport

Threat Analysis Report (Cryptomix)

Download the CryptoMix threat analysis report from McAfee Advanced Threat Defense to learn more about the threat level, behavior classification, and file execution timeline.

Topics: McAfee Labs,Recherche sur les menaces
mcafee-labs,recherche-sur-les-menaces,rapport

Threat Analysis Report (Samsa)

Download the SamSa threat analysis report from McAfee Advanced Threat Defense to learn more about the threat level, behavior classification, and file execution timeline.

Topics: McAfee Labs,Recherche sur les menaces
mcafee-labs,recherche-sur-les-menaces,rapport

Threat Analysis Report (Locky)

Download the Locky threat analysis report from McAfee Advanced Threat Defense to learn more about the threat level, behavior classification, and file execution timeline.

Topics: McAfee Labs,Recherche sur les menaces
mcafee-labs,recherche-sur-les-menaces,rapport

Threat Analysis Report (Spora)

Download the Spora threat analysis report from McAfee Advanced Threat Defense to learn more about the threat level, behavior classification, and file execution timeline.

Topics: McAfee Labs,Recherche sur les menaces
mcafee-labs,recherche-sur-les-menaces,rapport

Threat Analysis Report (Killdisk)

Download the KillDisk-Dimens threat analysis report from McAfee Advanced Threat Defense to learn more about the threat level, behavior classification, and file execution timeline.

Topics: McAfee Labs,Recherche sur les menaces
mcafee-labs,recherche-sur-les-menaces,rapport

Health Warning: Cyberattacks are Targeting the Health Care Industry

Our researchers investigate the theft of and marketplace for stolen personal health information and biopharmaceutical intellectual property.

Topics: McAfee Labs
mcafee-labs,rapport

The Hidden Data Economy

The marketplace for stolen digital information

Topics: McAfee Labs
mcafee-labs,rapport

McAfee Labs Threats Report March 2018

The McAfee Labs Threat Report: March 2018 highlights news and statistics gathered by the McAfee® Advanced Threat Research and McAfee Labs teams in Q4 of 2017. This quarter focuses on PowerShell malware, cryptocurrency mining, and increasing attacks targeting the health care sector.

Topics: McAfee Labs
mcafee-labs,rapport

McAfee Labs Threat Report: December 2017

McAfee Labs unveils statistics measuring recent threats and reporting on security incidents, malware, mobile, ransomware, fileless, web, and network threats.

Topics: McAfee Labs
mcafee-labs,rapport

McAfee Labs Threats Report: September 2017

McAfee Labs researchers examine the WannaCry and Petya malware attacks, offer advice to threat hunters searching for indicators of compromise, and dig into script-based malware.

Topics: McAfee Labs
mcafee-labs,rapport

McAfee Labs Quarterly Threat Report June 2017

McAfee Labs researchers examine the most powerful malware evasion techniques past, present, and future; the use of digital steganography in malware; and Fareit, the most famous password stealer.

Topics: McAfee Labs
mcafee-labs,rapport

McAfee Labs Threats Report: April 2017

McAfee Labs researchers discuss the background and drivers of threat intelligence sharing. We also examine Mirai, which is notable because it detects and infects poorly secured IoT devices, transforming them into bots to attack its targets.

Topics: McAfee Labs
mcafee-labs,rapport

Infographic: Threat Report April 2017 Key Findings

See a visual representation of our researchers’ key findings from the April 2017 report.

Topics: McAfee Labs,Recherche sur les menaces
mcafee-labs,recherche-sur-les-menaces,présentation-graphique

McAfee Labs Threats Report June 2018

The McAfee Labs Threats Report, June 2018 examines the growth and trends of new malware, ransomware, and other threats in Q1 2018. The report spotlights evolving attack techniques, cryptocurrency mining, and multisector attacks.

Topics: Recherche sur les menaces,McAfee Labs
recherche-sur-les-menaces,mcafee-labs,rapport

McAfee Labs Threat Report June 2018

This infographic highlights key trends and statistics from the McAfee Labs Threats Report, June 2018, including evolving attack techniques, cryptocurrency mining, and multisector attacks.

Topics: McAfee Labs,Recherche sur les menaces
mcafee-labs,recherche-sur-les-menaces,présentation-graphique

Blockchain Threat Report

This in-depth report covers current security problems and specific incidents within blockchain implementations, including bad actor’s techniques, targets, and malware used for attacks.

Topics: Advanced Threat Research
advanced-threat-research,rapport