McAfee Labs

Read McAfee Labs blogs for the latest threat research, threat intelligence, and thought leadership from the Threat Research team.

McAfee Opens State-of-the-Art Security Research Lab in Oregon
McAfee’s Advanced Threat Research team has operated from several locations around the world for many years. Today...
‘Insight’ into Home Automation Reveals Vulnerability in Simple IoT Product
Eoin Carroll, Charles McFarland, Kevin McGrath, and Mark Bereza contributed to this report.  The Internet of Things...
McAfee ePO Platform Gains Insight Into Threat Research
The latest update to the McAfee® ePolicy Orchestrator® platform offers a new add-in to provide insight into the...
Microsoft Cortana Allows Browser Navigation Without Login: CVE-2018-8253
A locked Windows 10 device with Cortana enabled on the lock screen allows an attacker with physical...
80 to 0 in Under 5 Seconds: Falsifying a Medical Patient’s Vitals
The author thanks Shaun Nordeck, MD, for his assistance with this report. With the explosion of growth...
Examining Code Reuse Reveals Undiscovered Links Among North Korea’s Malware Families
This research is a joint effort by Jay Rosenberg, senior security researcher at Intezer, and Christiaan Beek,...
GandCrab Ransomware Puts the Pinch on Victims
Update: On August 9 we added our analysis of Versions 4.2.1 and 4.3.  The GandCrab ransomware first...
CactusTorch Fileless Threat Abuses .NET to Infect Victims
McAfee Labs has noticed a significant shift by some actors toward using trusted Windows executables, rather than...
What Drives a Ransomware Criminal? CoinVault Developers Convicted
How often do we get a chance to learn what goes on in the minds of cybercriminals?...
Google Play Users Risk a Yellow Card With Android/FoulGoal.A
This blog post was co-written by Irfan Asrar. English soccer fans have enthusiastically enjoyed the team’s current...
Organizations Leave Backdoors Open to Cheap Remote Desktop Protocol Attacks
Thanks to my colleague Christiaan Beek for his advice and contributions. While researching underground hacker marketplaces, the...
Cybercrime in the Spotlight: How Crooks Capitalize on Cultural Events
Every four years, everyone’s head around the globe turns toward the television. The Olympics, the World Cup –...
241 - 252 of 692
Back to top