Featured Blogs
McAfee Team Members Share Their Virtual Onboarding Experiences
At McAfee, ensuring our new team members are well prepared and supported for their roles is a top priority. From...
Are You Prepared for Cybersecurity in the Boardroom?
Corporate boards have many dimensions of responsibility. Cybersecurity can be one of the most nuanced and important areas of focus...
Home-Point Cybersecurity: Bring Your Enterprise Home
For more than 20 years, the cybersecurity industry has been focused on enterprises, not on a larger national integrated security...
CVE-2020-17051: Remote kernel heap overflow in NFSv3 Windows Server
CVSS Score: 9.8 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Overview Microsoft released a patch today for a critical vulnerability (CVE-2020-17051) in the Windows NFSv3 (Network File System) server. NFS is typically...
Honoring Our Brave Military Veterans from the McAfee Community
Paying Tribute November 11 marks Veterans Day and Remembrance Day. It is a time for us to come together and...
One Team Member Selflessly Provides Relief to COVID-19’s Front Line
By: Heiko, Senior Security Engineer, Germany I never could have imagined that what started as a national duty to volunteer...
Operation North Star: Behind The Scenes
Executive Summary It is rare to be provided an inside view on how major cyber espionage campaigns are conducted within...
Operation North Star: Summary Of Our Latest Analysis
McAfee’s Advanced Threat Research (ATR) today released research that uncovers previously undiscovered information on how Operation North Star evaluated its...
Top 5 Things to Know About Recent IoT Attacks
While the IoT offers tremendous benefits, such as allowing users to monitor their homes or check the contents of their refrigerators remotely, it also presents a significant risk. For hackers, each IoT device represents a potential recruit for their bot armies.
Cybersecurity: Miscalculating Cyber Threats
Despite recognising the growing dangers of the cyberspace, consumers often overestimate their own capabilities to defend against such threats. This overconfidence coupled with self-deception presents an ideal opportunity for threat actors to exploit their vulnerabilities.