Other Blogs

[breadcrumb]

Featured Blogs

McAfee Labs

June #SecChat Recap: Findings from the 2016 Verizon DBIR

This year’s highly anticipated Verizon 2016 Data Breach Investigations Report (Verizon DBIR) analyzed cybersecurity findings from 100,000 incidents and 2,260...

McAfee Labs

Macro Malware Adds Tricks, Uses MaxMind to Avoid Detection

Macro malware continues to evolve and use new tricks to evade detection. This threat is responsible for downloading malicious Trojans...

McAfee Labs

JavaScript-PHP Joint Exercise Delivers Nemucod Ransomware

The ransomware Nemucod has been very prevalent in the last few months. Nemucod’s habit of frequently changing its delivery mechanism...

McAfee Labs

Microsoft’s June Patch Kills Potential CFG Bypass

After applying Microsoft’s June patch, we noticed some interesting changes that prevent a security bypass of Windows’ Control Flow Guard...

McAfee Labs

‘Thrones’ Jon Snow Appears to Employ Neutrino Exploit Kit

This blog post was written by Kalpesh Mantri. You read that right. Jon Snow appears to be back from the...

McAfee Labs

Experts Discuss the 2016 Verizon DBIR: June #SecChat

Cybersecurity in 2016 has been full of sensational headlines. Ransomware has shut down multiple hospitals, millions of credentials have been...

McAfee Labs

Zcrypt Expands Reach as ‘Virus Ransomware’

McAfee has recently seen a new kind of ransomware–Zcrypt—that can self-replicate. This “virus ransomware” arrives via email in a malicious...

McAfee Labs

Threat Actors Employ COM Technology in Shellcode to Evade Detection

COM (Component Object Model) is a technology in Microsoft Windows that enables software components to communicate with each other; it...

McAfee Labs

Locky Ransomware Hides Under Multiple Obfuscated Layers of JavaScript

This post was prepared with the invaluable assistance of Rahamathulla Hussain and Girish Kulkarni. During the last couple of weeks,...

McAfee Labs

Trillium Exploit Kit Update Offers ‘Security Tips’

McAfee Labs has previously blogged about the Trillium Exploit Kit Version 3.0, which is commonly used to create and distribute malware....

Subscribe to McAfee Securing Tomorrow Blogs

Back to top