Featured Blogs
Analyzing CVE-2021-1665 – Remote Code Execution Vulnerability in Windows GDI+
Introduction Microsoft Windows Graphics Device Interface+, also known as GDI+, allows various applications to use different graphics functionality on video...
McAfee Labs Report Highlights Ransomware Threats
The McAfee Advanced Threat Research team today published the McAfee Labs Threats Report: June 2021. In this edition we introduce...
Restricting Supplier Choice Isn’t an Option to Enhance Digital Sovereignty
Digital sovereignty and strategic autonomy are phrases that are used almost daily in EU policy circles, loosely framed around the...
Why Security is Now the Foundation of Good Customer Experience
What does ‘good customer service’ mean to you in 2021? A friendly greeting when you enter a shop? Quickly fixing...
A New Program for Your Peloton – Whether You Like It or Not
Executive Summary The McAfee Advanced Threat Research team (ATR) is committed to uncovering security issues in both software and hardware to help developers...
Are Virtual Machines the New Gold for Cyber Criminals?
Introduction Virtualization technology has been an IT cornerstone for organization for years now. It revolutionized the way organizations can scale...
Give CISOs a Shot – They Deserve It
Imagine this scenario: a CEO, CIO, CTO, CISO walk into a bar… The CTO has heard about cocktails that go...
Through Your Mind’s Eye: How to Address Biases in Cybersecurity – Part 2
In Part 1 of our Through Your Mind’s Eye series, we explored how our brains don’t give each decision we...
Through Your Mind’s Eye: What Biases Are Impacting Your Security Posture?
Cybersecurity and biases are not topics typically discussed together. However, we all have biases that shape who we are and,...
Scammers Impersonating Windows Defender to Push Malicious Windows Apps
Summary points: Scammers are increasingly using Windows Push Notifications to impersonate legitimate alerts Recent campaigns pose as a Windows Defender...