Все публикации

Фильтровать содержимое:

Hide English Publications

Operationalizing Threat Intelligence

Behind just about every legitimate alert your IT security receives is an adversary using multiple attack techniques to penetrate your infrastructure and compromise your vital data assets or systems. Today’s targeted multiphase attacks consist of a series of steps that make up the cyberattack chain: reconnaissance, scanning for vulnerabilities, exploitation, and, finally, exfiltration of valuable corporate data.
Темы: McAfee Labs

McAfee Labs Threats Report: September 2017 (English)

McAfee Labs researchers examine the WannaCry and Petya malware attacks, offer advice to threat hunters searching for indicators of compromise, and dig into script-based malware.
Темы: McAfee Labs

Protecting Against Script-Based Malware (English)

Read our recommended policies and procedures and how our products can protect against script-based code in malware attacks.
Темы: McAfee Labs

Protecting Against WannaCry and Petya (English)

Read our recommended policies and procedures and how McAfee products can protect systems and networks from WannaCry and Petya.
Темы: McAfee Labs

McAfee Labs Quarterly Threat Report June 2017 (English)

McAfee Labs researchers examine the most powerful malware evasion techniques past, present, and future; the use of digital steganography in malware; and Fareit, the most famous password stealer.
Темы: McAfee Labs

Protecting Against Evasive Malware (English)

Recommended policies and procedures and how McAfee solutions can combat the most evasive modern threats.
Темы: McAfee Labs

Protecting Against Steganographic Threats (English)

Recommended policies and procedures and how McAfee solutions can protect against steganographic code in malware attacks.
Темы: McAfee Labs

Protecting Against Password Stealers (English)

Recommended policies and procedures and how McAfee solutions can protect systems and networks from password stealers.
Темы: McAfee Labs

McAfee Labs Threats Report: April 2017 (English)

McAfee Labs researchers discuss the background and drivers of threat intelligence sharing. We also examine Mirai, which is notable because it detects and infects poorly secured IoT devices, transforming them into bots to attack its targets.
Темы: McAfee Labs

Secure IoT Devices to Protect Against Attacks (English)

McAfee explains how to secure IoT devices and how our products can protect systems and networks from IoT device attacks.
Темы: McAfee Labs