McAfee Labs

Read McAfee Labs blogs for the latest threat research, threat intelligence, and thought leadership from the Threat Research team.

McAfee Labs Threats Report Highlights Ransomware, Flash Exploits, Firmware Attacks Surge
The McAfee Labs Threats Report describes a surge in ransomware, new Adobe Flash exploits, and attacks that reprogram hard disk...
When Hackers Get Hacked: the Malware Servers of a Data-Stealing Campaign
Selling stolen data is an easy way for cybercriminals to make money. One typical campaign makes a two-way connection between...
Meet ‘Tox’: Ransomware for the Rest of Us
Similar to other threats, ransomware has now appeared in an easy-to-deploy cybercrime kit. The malware is called Tox, and it's...
Malware Spreads Through Facebook Tag Scam
McAfee has recently observed a malware spreading through Facebook. This type of malware is not new, but...
Brazilian Banking Malware Hides in SQL Database
This banking malware is a password stealer and downloader that targets users in Brazil. The main difference...
Stolen Credit Card Numbers Easy to Buy Online
We've seen a number of articles about the “Dark Web,” underground cybercriminal sites hosted on hidden servers and accessed only...
Update on the Beebone Botnet Takedown
On April 8, the takedown operation for the polymorphic botnet known as Beebone successfully concluded.
Verizon Report Foreshadows Breaches Originating With IoT Devices
Most examples of security breaches originating with Internet of Things devices have been proofs of concept—at least for now. That...
Taking a Close Look at Data-Stealing NionSpy File Infector
NionSpy prefixes its malicious binary onto executable files--unlike other data-stealing Trojans, which store all their functions in a single file.
VaultCrypt Ransomware Hides Its Traces While Stealing Web Credentials
A recent ransomware variant of Vaultcrypt both tidies up after itself and steals the victim's web page login data.
Takedown Stops Polymorphic Botnet
Several global law enforcement agencies and McAfee this week successfully dismantled the "Beebone" botnet behind the polymorphic worm W32/Worm-AAEH.
POS Malware Uses Time-Stamp Check to Evade Detection
PoS malware uses timestamp check to make its campaign shot life and evade sandbox by exiting initially to stop running...
505 - 516 of 696
Back to top