Other Blogs

[breadcrumb]

Featured Blogs

McAfee Labs

Android malware distributed in Mexico uses Covid-19 to steal financial credentials

Authored by Fernando Ruiz McAfee Mobile Malware Research Team has identified malware targeting Mexico. It poses as a security banking tool or as a bank...

McAfee Labs

Phishing Android Malware Targets Taxpayers in India

Authored by ChanUng Pak   McAfee’s Mobile Research team recently found a new Android malware, Elibomi, targeting taxpayers in India. The malware steals sensitive financial and private information via phishing by pretending...

McAfee Labs

The Rise of Deep Learning for Detection and Classification of Malware

Co-written by Catherine Huang, Ph.D. and Abhishek Karnik  Artificial Intelligence (AI) continues to evolve and has made huge progress over the last decade. AI shapes our daily lives. Deep learning is a subset of techniques in AI that...

McAfee Labs

XLSM Malware with MacroSheets

Written by: Lakshya Mathur Excel-based malware has been around for decades and has been in the limelight in recent years. During the second half of 2020, we saw...

McAfee Labs

Babuk: Biting off More than they Could Chew by Aiming to Encrypt VM and *nix Systems?

Co-written with Northwave’s Noël Keijzer. Executive Summary For a long time, ransomware gangs were mostly focused on Microsoft Windows operating...

McAfee News Life at McAfee

My Journey from Intern to Principal Engineer

Written by Shuborno, Principal Engineer At McAfee, architects and engineers continuously have opportunities to make decisions that impact customers and...

McAfee Labs

Fighting new Ransomware Techniques with McAfee’s Latest Innovations

In 2021 ransomware attacks have been dominant among the bigger cyber security stories. Hence, I was not surprised to see...

McAfee Labs

An Overall Philosophy on the Use of Critical Threat Intelligence

The overarching threat facing cyber organizations today is a highly skilled asymmetric enemy, well-funded and resolute in his task and...

McAfee Labs

REvil Ransomware Uses DLL Sideloading

This blog was written byVaradharajan Krishnasamy, Karthickkumar, Sakshi Jaiswal Introduction Ransomware attacks are one of the most common cyber-attacks among...

Executive Perspectives

Time to Batten the Cyber-Hatches

We all like to think we’d know what to do if an emergency should occur. In split seconds, we try to...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top