Other Blogs

[breadcrumb]

Featured Blogs

McAfee Labs

Analyzing CVE-2021-1665 – Remote Code Execution Vulnerability in Windows GDI+

Introduction Microsoft Windows Graphics Device Interface+, also known as GDI+, allows various applications to use different graphics functionality on video...

McAfee Labs

McAfee Labs Report Highlights Ransomware Threats

The McAfee Advanced Threat Research team today published the McAfee Labs Threats Report: June 2021. In this edition we introduce...

Executive Perspectives

Restricting Supplier Choice Isn’t an Option to Enhance Digital Sovereignty

Digital sovereignty and strategic autonomy are phrases that are used almost daily in EU policy circles, loosely framed around the...

Executive Perspectives

Why Security is Now the Foundation of Good Customer Experience

What does ‘good customer service’ mean to you in 2021? A friendly greeting when you enter a shop? Quickly fixing...

McAfee Labs

A New Program for Your Peloton – Whether You Like It or Not

Executive Summary  The McAfee Advanced Threat Research team (ATR) is committed to uncovering security issues in both software and hardware to help developers...

McAfee Labs

Are Virtual Machines the New Gold for Cyber Criminals?

Introduction Virtualization technology has been an IT cornerstone for organization for years now. It revolutionized the way organizations can scale...

Executive Perspectives

Give CISOs a Shot – They Deserve It

Imagine this scenario: a CEO, CIO, CTO, CISO walk into a bar…    The CTO has heard about cocktails that go...

Executive Perspectives

Through Your Mind’s Eye: How to Address Biases in Cybersecurity – Part 2

In Part 1 of our Through Your Mind’s Eye series, we explored how our brains don’t give each decision we...

Executive Perspectives

Through Your Mind’s Eye: What Biases Are Impacting Your Security Posture?

Cybersecurity and biases are not topics typically discussed together. However, we all have biases that shape who we are and,...

McAfee Labs

Scammers Impersonating Windows Defender to Push Malicious Windows Apps

Summary points: Scammers are increasingly using Windows Push Notifications to impersonate legitimate alerts Recent campaigns pose as a Windows Defender...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top