Quantcast
Channel: McAfee Labs | McAfee Blogs
Browsing all 745 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – Follow The...

Episode 3: Follow the Money This is the third installment of the McAfee Advanced Threat Research (ATR) analysis of Sodinokibi and its connections to GandCrab, the most prolific Ransomware-as-a-Service...

View Article


Image may be NSFW.
Clik here to view.

McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – Crescendo

Episode 4: Crescendo This is the final installment of the McAfee Advanced Threat Research (ATR) analysis of Sodinokibi and its connections to GandGrab, the most prolific Ransomware-as-a-Service (RaaS)...

View Article


Image may be NSFW.
Clik here to view.

Using Expert Rules in ENS 10.5.3 to Prevent Malicious Exploits

Expert Rules are text-based custom rules that can be created in the Exploit Prevention policy in ENS Threat Prevention 10.5.3+. Expert Rules provide additional parameters and allow much more...

View Article

Image may be NSFW.
Clik here to view.

Did You Check Your Quarantine?!

A cost-effective way to detect targeted attacks in your enterprise While it is easy to get caught up in the many waves of new and exciting protection strategies, we have recently discovered an...

View Article

Image may be NSFW.
Clik here to view.

Office 365 Users Targeted by Voicemail Scam Pages

Over the past few weeks McAfee Labs has been observing a new phishing campaign using a fake voicemail message to lure victims into entering their Office 365 email credentials. At first, we believed...

View Article


Image may be NSFW.
Clik here to view.

Buran Ransomware; the Evolution of VegaLocker

McAfee’s Advanced Threat Research Team observed how a new ransomware family named ‘Buran’ appeared in May 2019. Buran works as a RaaS model like other ransomware families such as REVil, GandCrab (now...

View Article

Image may be NSFW.
Clik here to view.

Spanish MSSP Targeted by BitPaymer Ransomware

Initial Discovery This week the news hit that several companies in Spain were hit by a ransomware attack. Ransomware attacks themselves are not new but, by interacting with one of the cases in Spain,...

View Article

Image may be NSFW.
Clik here to view.

McAfee Labs 2020 Threats Predictions Report

With 2019’s headlines of ransomware, malware, and RDP attacks almost behind us, we shift our focus to the cybercrime threats ahead. Cybercriminals are increasing the complexity and volume of their...

View Article


Image may be NSFW.
Clik here to view.

Analysis of LooCipher, a New Ransomware Family Observed This Year

Initial Discovery This year seems to again be the year for ransomware. Notorious attacks were made using ransomware and new families are being detected almost on a weekly basis. The McAfee ATR team has...

View Article


Image may be NSFW.
Clik here to view.

Top Tips to Spot Tech Support Scams

There are number of ways scammers use to target your money or personal details.  These scams include support sites for services such as Office365, iCloud, Gmail, etc. They will charge you for the...

View Article

Image may be NSFW.
Clik here to view.

The Tradeoff Between Convenience and Security – A Balancing Act for Consumers...

This week McAfee Advanced Threat Research (ATR) published new findings, uncovering security flaws in two popular IoT devices: a connected garage door opener and a “smart” ring, which, amongst many...

View Article

Image may be NSFW.
Clik here to view.

The Cloning of The Ring – Who Can Unlock Your Door?

Steve Povolny contributed to this report. McAfee’s Advanced Threat Research team performs security analysis of products and technologies across nearly every industry vertical. Special interest in the...

View Article

Image may be NSFW.
Clik here to view.

We Be Jammin’ – Bypassing Chamberlain myQ Garage Doors

The idea of controlling your garage door remotely and verifying that everything is secure at home, or having packages delivered directly into your garage is enticing for many people. The convenience...

View Article


Image may be NSFW.
Clik here to view.

Iran Cyber Threat Update

Recent political tensions in the Middle East region have led to significant speculation of increased cyber-related activities. McAfee is on a heightened state of alert to monitor the evolving threats...

View Article

Image may be NSFW.
Clik here to view.

What CVE-2020-0601 Teaches Us About Microsoft’s TLS Certificate Verification...

By: Jan Schnellbächer and Martin Stecher, McAfee Germany GmbH This week security researches around the world were very busy working on Microsoft’s major crypto-spoofing vulnerability (CVE-2020-0601)...

View Article


Image may be NSFW.
Clik here to view.

CurveBall – An Unimaginative Pun but a Devastating Bug

Enterprise customers looking for information on defending against Curveball can find information here. 2020 came in with a bang this year, and it wasn’t from the record-setting number of fireworks on...

View Article

Image may be NSFW.
Clik here to view.

An Inside Look into Microsoft Rich Text Format and OLE Exploits

There has been a dramatic shift in the platforms targeted by attackers over the past few years. Up until 2016, browsers tended to be the most common attack vector to exploit and infect machines but now...

View Article


Image may be NSFW.
Clik here to view.

U.S. Battleground County Website Security Survey

Today McAfee released the results of a survey of county websites and county election administration websites in the 13 states projected as battleground states in the 2020 U.S. presidential elections....

View Article

Image may be NSFW.
Clik here to view.

Intelligence in the Enterprise

Intelligence became an integral military discipline centuries ago. More recently, this practice evolved into what is called Intelligence Preparation of the Battlefield, or IPB. In both military and...

View Article

Image may be NSFW.
Clik here to view.

How Chinese Cybercriminals Use Business Playbook to Revamp Underground

Preface Because of its longevity and technical sophistication, the Russian cybercriminal underground has long been the benchmark for threat researchers focused on studying cybercrime tactics and...

View Article
Browsing all 745 articles
Browse latest View live