View All Publications

Filter Content:

Operationalizing Threat Intelligence

Behind just about every legitimate alert your IT security receives is an adversary using multiple attack techniques to penetrate your infrastructure and compromise your vital data assets or systems. Today’s targeted multiphase attacks consist of a series of steps that make up the cyberattack chain: reconnaissance, scanning for vulnerabilities, exploitation, and, finally, exfiltration of valuable corporate data.
Topics: McAfee Labs

McAfee Labs Threats Report: September 2017

McAfee Labs researchers examine the WannaCry and Petya malware attacks, offer advice to threat hunters searching for indicators of compromise, and dig into script-based malware.
Topics: McAfee Labs

Protecting Against Script-Based Malware

Read our recommended policies and procedures and how our products can protect against script-based code in malware attacks.
Topics: McAfee Labs

Protecting Against WannaCry and Petya

Read our recommended policies and procedures and how McAfee products can protect systems and networks from WannaCry and Petya.
Topics: McAfee Labs

McAfee Labs Quarterly Threat Report June 2017

McAfee Labs researchers examine the most powerful malware evasion techniques past, present, and future; the use of digital steganography in malware; and Fareit, the most famous password stealer.
Topics: McAfee Labs

Protecting Against Evasive Malware

Recommended policies and procedures and how McAfee solutions can combat the most evasive modern threats.
Topics: McAfee Labs

Protecting Against Steganographic Threats

Recommended policies and procedures and how McAfee solutions can protect against steganographic code in malware attacks.
Topics: McAfee Labs

Protecting Against Password Stealers

Recommended policies and procedures and how McAfee solutions can protect systems and networks from password stealers.
Topics: McAfee Labs

McAfee Labs Threats Report: April 2017

McAfee Labs researchers discuss the background and drivers of threat intelligence sharing. We also examine Mirai, which is notable because it detects and infects poorly secured IoT devices, transforming them into bots to attack its targets.
Topics: McAfee Labs

Secure IoT Devices to Protect Against Attacks

McAfee explains how to secure IoT devices and how our products can protect systems and networks from IoT device attacks.
Topics: McAfee Labs