Featured Blogs
Shamoon Rebooted?
We have recently received notifications and samples from impacted organizations in the Middle East that have hallmarks of the Shamoon...
Big, Hard-to-Solve Problems
Improving the Lifecycle of Threat Defense Effectiveness When a new security tool or technique is released, Version 1.0 is usually...
Worms Could Spread Like Zombies via Internet of Things
Security researchers recently created a proof-of-concept attack against Internet-connected lightbulbs, causing breached devices to infect their neighbors. The propagation continues...
More Capable IoT Botnets to Emerge as the ‘Pros’ Enter the Fray
On the heels of severe distributed denial of service (DDoS) attacks, we see new botnets emerging that are powered by...
Together is Power: FOCUS 16 and the Future of Cybersecurity
This blog was written by Chris Young, McAfee’s former CEO. I led last week’s FOCUS 16 conversation with a simple...
Defense Evolved: From Threat Intelligence, to Investigation, to Orchestration with DXL
In my last post, I discussed the attributes of our adversaries, the drivers behind their activities, and their recent attack...
Talking About Cyber Risks Educates the Community
In the last 12 months, we have seen an unprecedented number of cyberattacks occur or come to light. Sophisticated attacks against...
Security, Time, and the Decline of Efficacy
This week at the FOCUS’16 conference in Las Vegas, I shared perspectives on today’s changing threat landscape, how we must...
Cerber Ransomware Now Hunts for Databases
Cerber is one of the most popular ransomware packages. It has upgraded itself to also target databases. It is available...
Chance of a Lifetime
This blog was written by Brian Dye. Writing from the FOCUS 16 Security Conference, Wed., Nov. 2 I just came...