Stopping Malware With a Fake Virtual Machine
As we explained in a previous post, some advanced malware can detect a virtual environment such as a sandbox to...
Unfolding the Mystery of Cerber Ransomware’s Random File Extension
This blog post was written by Sudhanshu Dubey. In an earlier blog, we discussed the evolution of the popular Cerber...
Password-Protected Attachment Serves Ransomware
Attacks by macro malware carrying ransomware are growing, as we have recently reported. Since early March we have seen macro...
Ransomware Variant XTBL Another Example of Popular Malware
We have seen a huge increase in ransomware during the past couple of years. At McAfee Labs we have recently...
How Searching for Funny Online Can Wreck Your Family Tech
Perhaps the most alarming thing about cybercriminals is that they know us so well. They study human behavior. They study...
Sharing Cybersecurity Threat Intelligence Is the Only Way We Win
Cybersecurity is a team sport. The bad guys share information, expertise, and code as they help one another. The good...
Macro Malware Employs Advanced Sandbox-Evasion Techniques
During the past couple of weeks, McAfee Labs has observed a new variant of macro malware. With this variant when...
Locky Ransomware Hides Inside Packed .DLL
McAfee Labs has seen a huge increase in Locky ransomware in recent months (discussed in an earlier blog). Locky is aggressively...
Malware Hides in Installer to Avoid Detection
At McAfee Labs we recently observed various threat families using the Nullsoft Scriptable Install System (NSIS). This practice is not...
Wildfire Ransomware Extinguished by Tool From NoMoreRansom
McAfee and Kaspersky Lab, partners in the project NoMoreRansom, are pleased to announce today the availability of a decryption tool...