Featured Blogs
Defending Cybersecurity Can’t Be Done Blindfolded–The EU’s NIS2 Review Can Set This Right
Cybercriminals are currently enjoying a golden age, with the volume and severity of attacks growing constantly, and an ability to...
Roaming Mantis Amplifies Smishing Campaign with OS-Specific Android Malware
The Roaming Mantis smishing campaign has been impersonating a logistics company to steal SMS messages and contact lists from Asian...
How to Stop the Popups
McAfee is tracking an increase in the use of deceptive popups that mislead some users into taking action, while annoying...
Stupid Is as Stupid Does: XDR Is About the Journey, Not the Destination
Music is lovely, isn’t it? It has the ability to brighten days with upbeat bars or provide a comfortable place...
Ransomware Task Force Releases its Comprehensive Framework for Action
Since ransomware’s introduction in 1989 in the form of the AIDS Trojan, also known as PS Cyborg, distributed on diskettes,...
Trust Nobody, Not Even Yourself: Time to Take Zero Trust Seriously
In the working world, there’s a chance you’ve come across your fair share of team-building exercises and workshops. There’s one exercise...
Access Token Theft and Manipulation Attacks – A Door to Local Privilege Escalation
Executive Summary Many malware attacks designed to inflict damage on a network are armed with lateral movement capabilities. Post initial...
Clever Billing Fraud Applications on Google Play: Etinu
Authored by: Sang Ryol Ryu and Chanung Pak A new wave of fraudulent apps has made its way to the...
McAfee VP Shares His Four Pledges for a Healthier Lifestyle
After experiencing a health scare that changed his life, VP of Technology Services, Paul, vowed to make incremental changes by...
McAfee Labs Report Reveals Latest COVID-19 Threats and Malware Surges
The McAfee Advanced Threat Research team today published the McAfee Labs Threats Report: April 2021. In this edition, we present...