Featured Blogs
From Military Kid to Product Marketing: My McAfee Journey
Employee Spotlight: Meet Jovohn! From military beginnings to mobile security champion, meet Jovohn, our passionate Product Marketer and MAHC President....
Celebrating International Day of Women and Girls in Science
Advice and Insights from some of McAfee’s brightest STEM leaders This International Day of Women and Girls in Science, #TeamMcAfee...
MoqHao evolution: New variants start automatically right after installation
Authored by Dexter Shin MoqHao is a well-known Android malware family associated with the Roaming Mantis threat actor group first...
Generative AI: Cross the Stream Where it is Shallowest
The explosive growth of Generative AI has sparked many questions and considerations not just within tech circles, but in mainstream...
From Email to RAT: Deciphering a VB Script-Driven Campaign
Authored by Preksha Saxena and Yashvi Shah McAfee Labs has been tracking a sophisticated VBS campaign characterized by obfuscated Visual...
Honoring Martin Luther King Jr.’s Legacy with McAfee’s African Heritage Community
Today, we celebrate the life and legacy of Dr. Martin Luther King Jr. Dr. King diligently dedicated his life to...
Stealth Backdoor “Android/Xamalicious” Actively Infecting Devices
Authored by Fernando Ruiz McAfee Mobile Research Team identified an Android backdoor implemented with Xamarin, an open-source framework that allows...
Shielding Against Android Phishing in Indian Banking
Authored by Neil Tyagi and Fernando Ruiz In a digitally evolving world, the convenience of banking through mobile applications has...
PDF Phishing: Beyond the Bait
By Lakshya Mathur & Yashvi Shah Phishing attackers aim to deceive individuals into revealing sensitive information for financial gain, credential...
Beneath the Surface: How Hackers Turn NetSupport Against Users
NetSupport malware variants have been a persistent threat, demonstrating adaptability and evolving infection techniques. In this technical analysis, we delve...