New TeslaCrypt Ransomware Arrives via Spam
During the last couple of weeks, McAfee Labs has observed a huge increase in spam related to Nemucod, a malicious...
Overcoming Targeted Attacks: a New Approach
Successful targeted attacks bypass security controls and typically cause significant damage to an enterprise. Damages may include reputation, monetary, and...
The Hidden Costs of Cyber Attacks
The real costs of cyber attacks are difficult to understand. The impacts of cybersecurity are terribly challenging to measure, which...
Ease of Buying Ransomware Fuels Affiliate Program
For several weeks after we released the McAfee Labs Threats Report, May 2015, in which we discussed the topic of...
Threat Actors Use Encrypted Office Binary Format to Evade Detection
This blog post was written in conjunction with Xiaoning Li. Microsoft Office documents play an important role in our work...
‘Evoltin’ POS Malware Attacks via Macro
Over the past couple of months McAfee Labs has seen an increase in the usage of macros to deliver malware....
McAfee Labs Threats Report Highlights Ransomware, Flash Exploits, Firmware Attacks Surge
This blog post was written by Rick Simon. McAfee today released the McAfee Labs Threats Report: May 2015. Along with...
Meet ‘Tox’: Ransomware for the Rest of Us
The packaging of malware and malware-construction kits for cybercrime “consumers” has been a long-running trend. Various turnkey kits that cover...
Update on the Beebone Botnet Takedown
On April 8, the takedown operation for the polymorphic botnet known as Beebone successfully concluded. This action redirected traffic from...
Taking a Close Look at Data-Stealing NionSpy File Infector
This blog was written by Sanchit Karve. W32/NionSpy is a family of malware that steals information from infected machines and...