McAfee Labs
Threat Research Team
McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.
Articles by Author
McAfee Labs
Improve Protection Against Cyberattacks Through Shared Threat Intelligence
This blog post was written by Rick Simon. At the RSA Conference 2016 in San Francisco, Chris...Aug 25, 2016 | 2 MIN READ
Privacy & Identity Protection
Tax Fraud Robocalls Can Amuse, but Don’t Become a Phishing Victim
Yesterday at work, I received a call on my cell phone while in a meeting and did...Aug 16, 2016 | 4 MIN READ
McAfee Labs
Cerber Ransomware Updates Configuration File
This blog post was written by Sudhanshu Dubey. McAfee Labs has recently analyzed Version 2 of Cerber,...Aug 15, 2016 | 5 MIN READ
McAfee Labs
Taking Steps to Fight Back Against Ransomware
Ransomware is an attack in which malware encrypts files and extorts money from victims. It has become...Jul 27, 2016 | 8 MIN READ
McAfee Labs
Trojanized Propaganda App Uses Twitter to Infect, Spy on Sympathizers
The Mobile Malware Research Team of McAfee has discovered in recent weeks a number of new threats...Jul 26, 2016 | 4 MIN READ
McAfee Labs
‘Thrones’ Jon Snow Appears to Employ Neutrino Exploit Kit
This blog post was written by Kalpesh Mantri. You read that right. Jon Snow appears to be...Jun 10, 2016 | 4 MIN READ
McAfee Labs
Seeing Through Darkleech Obfuscation: a Quick Hack to Iframes
This blog post was written by Kalpesh Mantri. Darkleech is an Apache module on the dark web...May 27, 2016 | 6 MIN READ
McAfee Labs
Which Cybersecurity Data Should You Trust?
Limitations of security data We are constantly battered by cybersecurity data, reports, and marketing collateral—and we shouldn’t treat...May 24, 2016 | 7 MIN READ
McAfee Labs
5 Steps to Enhance Security of Cloud Applications
This blog post was written by Dileep Dasari. When you move applications to the cloud, the attack surface...May 18, 2016 | 5 MIN READ
McAfee Labs
Can Zealous Security Cause Harm?
Good security requires balancing risks, costs, and usability. Too much or too little of each can be...May 17, 2016 | 3 MIN READ
McAfee Labs
Key Lessons From Verizon’s ‘2016 Data Breach Investigations Report’
The annual Data Breach Investigations Report (DBIR) is out and reinforces the value of well-established cybersecurity practices....May 12, 2016 | 3 MIN READ
McAfee Labs
Server-Side Request Forgery Takes Advantage of Vulnerable App Servers
This blog was written by Kunal Garg. Server-side request forgery is an attack in which an attacker...May 12, 2016 | 4 MIN READ