Featured Blogs
A Field Trip to McAfee’s World of Cyber
By: Amanda Steger, Senior Director & Sandra Chin, Engineering Operations Manager Educating the next generation of cybersecurity heroes has always...
Threat Report: Don’t Join Blockchain Revolution Without Ensuring Security
On May 19 researchers discovered a series of vulnerabilities in the blockchain-based EOS platform that can lead to remote control...
Want to Break Into a Locked Windows 10 Device? Ask Cortana (CVE-2018-8140)
June’s “Patch Tuesday” (June 12) is here, but it is likely many Windows 10 users have not yet applied these updates.
VPNFilter Malware Adds Capabilities to Exploit Endpoints
VPNFilter, a botnet-controlled malware that infects networking devices, was first documented by researchers from Cisco Talos. McAfee Labs also published...
My Global Internship Experience
By: Madeleine Human Resources, Intern Picture this: approaching the end of your double degree, applying for internships and work experience...
VPNFilter Botnet Targets Networking Devices
VPNFilter is a botnet with capabilities to support both intelligence collection and destructive cyberattack operations. The Cisco Talos team recently notified members of the Cyber Threat Alliance (CTA) of its findings and published this blog.
It’s a Zoo Out There! Data Analysis of Alleged ZooPark Dump
In early May, researchers disclosed a Mobile malware campaign by a group focused on Middle Eastern targets. This actor was...
Global Community Service Day 2018: Together for good
By: Emily, Communications Program Manager When I finished college, I went to work for the same nonprofit youth sports organization...
Malware on Google Play Targets North Korean Defectors
Earlier this year, McAfee researchers predicted in the McAfee Mobile Threat Report that we expect the number of targeted attacks on mobile devices to increase due to their ubiquitous growth combined with the sophisticated tactics used by malware authors.
Syn/Ack Unique Proactive Protection Technique
McAfee’s Advanced Threat Research team has performed analysis on samples of Syn/Ack ransomware implementing Process Doppelgänging. For those who are...