McAfee Labs

Read McAfee Labs blogs for the latest threat research, threat intelligence, and thought leadership from the Threat Research team.

2016 Cybersecurity Predictions Report Examines Growth in Integrity Attacks
Cybersecurity changes rapidly. Those with valuable insights can better prepare for the shifting risks and opportunities. McAfee has...
Beware the Rapid Proliferation of Cyber-warfare Capabilities
Over 60 countries, a number that is rising, currently have some mechanism to play in the digital warfare and intelligence...
CryptoWall V3 and V4 Protection for McAfee Customers
Updated, November 6:  Since October 30, the release date of the Cyber Threat Alliance report on CryptoWall...
Ransomware: an Insight to Financial Gain
The Cyber Threat Alliance examines the financial gains of a popular malware in "Lucrative Ransomware Attacks: Analysis of the CryptoWall...
Hidden Data Economy Report Exposes Price Points for Stolen Data
The Hidden Data Economy report from McAfee Labs provides examples of how stolen data is being packaged and sold.
We’ve Been Hacked! Okay, I’ll Deal With It Next Week
That was the message I got from a CEO when we presented evidence that their organization had...
Japanese Banking Trojan Shifu Combines Malware Tools
A new banking Trojan combines elements of multiple malware tools. Shifu has circulated since April, and attacks primarily Japanese banks.
Best practices for preventing Dridex infections
Mitigating the Dridex threat at multiple levels like file, registry, url and ip address can be achieved at...
AshleyMadison Hack Demonstrates Power of Scam Artists
This blog post was written by Armando Rodriguez. Last month, cybersecurity journalist Brian Krebs broke the news...
Ease of Buying Ransomware Fuels Affiliate Program
Ransomware's success is fueled by the ease of getting ransomware and how how well the affiliate program works.
Threat Actors Use Encrypted Office Binary Format to Evade Detection
Attacks leveraging the Sandworm vulnerability now include some interesting detection-evasion techniques, specifically an old format and encryption.
‘Evoltin’ POS Malware Attacks via Macro
Recently McAfee labs found a point-of-sale malware that spreads through malicious macros inside a doc file. This threat arrives via...
493 - 504 of 696
Back to top