Server-Side Request Forgery Takes Advantage of Vulnerable App Servers
This blog was written by Kunal Garg. Server-side request forgery is an attack in which an attacker can force a...
The Morning After: What Happens to Data Post-Breach?
This post first appeared on the security website Dark Reading. We need consumers and businesses to not simply shrug off...
Quarterly Threat Report: What Do the Numbers Mean to Me?
This blog post was written by Bruce Snell. Every quarter, the team at McAfee Labs releases a threats report detailing...
DHS Accelerates Information Sharing Standards Effort; McAfee to Chair Working Group
This post first appeared at Policy@Intel on March 9. In an effort to accelerate cyber information sharing, and in response...
5G Networks Pose Cyber Risks, Opportunities
Fifth-generation networking (5G) holds the potential for a massive immersion of technology into the lives of people and businesses. It...
Targeted Ransomware No Longer a Future Threat
This post was written by Christiaan Beek and Andrew Furtak. In 2015, McAfee investigated a ransomware campaign that targeted the...
A Case of Mistaken Identity? The Role of BlackEnergy in Ukrainian Power Grid Disruption
Recent reports of electricity outages across the Ukraine has led to significant speculation regarding the specific malware that was used...
Automotive Security Moves Into Cyber Realm
The focus on the security of automobiles and the transportation sector as a whole (planes, trains, etc.) is steadily increasing....
Attackers Seek to Hack Hardware for Ultimate Control
We are seeing interesting changes in how researchers and attackers are exploring methods to undermine systems and devices. Increasingly, the...
Updated BlackEnergy Trojan Grows More Powerful
In late December, a cyberattack caused a power outage in the Ukraine, plunging hundreds of thousands of citizens into darkness...