
Authored by Lakshya Mathur An LNK file is a Windows Shortcut that serves as a pointer to open a file,…
The post Rise of LNK (Shortcut files) Malware appeared first on McAfee Blog.
Authored by Lakshya Mathur An LNK file is a Windows Shortcut that serves as a pointer to open a file,…
The post Rise of LNK (Shortcut files) Malware appeared first on McAfee Blog.
Authored by Dexter Shin Instagram has become a platform with over a billion monthly active users. Many of Instagram’s users…
The post Instagram credentials Stealers: Free Followers or Free Likes appeared first on McAfee Blog.
Authored by Dexter Shin McAfee’s Mobile Research Team introduced a new Android malware targeting Instagram users who want to increase…
The post Instagram credentials Stealer: Disguised as Mod App appeared first on McAfee Blog.
https://origin-blogs.mcafee.com/blogs
The post Test Test 2 appeared first on McAfee Blog.
McAfee Labs have been observing a spike in phishing campaigns that utilize Microsoft office macro capabilities. These malicious documents reach…
The post Test Post appeared first on McAfee Blog.
By Oliver Devane Update: In the past 24 hours (from time of publication) McAfee has identified 15 more scam sites…
The post Crypto Scammers Exploit: Elon Musk Speaks on Cryptocurrency appeared first on McAfee Blog.
Authored by Jyothi Naveen and Kiran Raj McAfee Labs have been observing a spike in phishing campaigns that utilize Microsoft…
The post Phishing Campaigns featuring Ursnif Trojan on the Rise appeared first on McAfee Blog.
By Oliver Devane McAfee has identified several Youtube channels which were live-streaming a modified version of a live stream called…
The post Crypto Scammers exploit talk on Cryptocurrency appeared first on McAfee Blog.
Authored by Dexter Shin McAfee’s Mobile Research Team introduced a new Android malware targeting Instagram users who want to increase…
The post Instagram Credentials Stealer: Disguised as Mod App appeared first on McAfee Blog.
Authored by Dexter Shin Instagram has become a platform with over a billion monthly active users. Many of Instagram’s users…
The post Instagram Credentials Stealers: Free Followers or Free Likes appeared first on McAfee Blog.
Authored by Vallabh Chole and Oliver Devane Scammers are very quick at reacting to current events, so they can generate…
The post Scammers are Exploiting Ukraine Donations appeared first on McAfee Blog.
Authored by Oliver Devane, Vallabh Chole, and Aayush Tyagi McAfee has recently observed several malicious Chrome Extensions which, once installed,…
The post Come Join the Scam Party appeared first on McAfee Blog.
Authored by Oliver Devane and Vallabh Chole Notifications on Chrome and Edge, both desktop browsers, are commonplace, and malicious actors…
The post Why Am I Getting All These Notifications on my Phone? appeared first on McAfee Blog.
Authored By: Kiran Raj In a recent campaign of Emotet, McAfee Researchers observed a change in techniques. The Emotet maldoc…
The post Emotet’s Uncommon Approach of Masking IP Addresses appeared first on McAfee Blog.
By Sriram P & Lakshya Mathur Hancitor, a loader that provides Malware as a Service, has been observed distributing malware such as…
The post HANCITOR DOC drops via CLIPBOARD appeared first on McAfee Blogs.
Co-authored by: P, Sriram, and Deepak Setty ‘Tis the season for scams. Well, honestly, it’s always scam season somewhere. In…
The post ‘Tis the Season for Scams appeared first on McAfee Blogs.
Authored By Kiran Raj Due to their widespread use, Office Documents are commonly used by Malicious actors as a way…
The post The Newest Malicious Actor: “Squirrelwaffle” Malicious Doc. appeared first on McAfee Blogs.
Authored by: Wenfeng Yu McAfee Mobile Research team recently discovered a new piece of malware that specifically steals Google, Facebook,…
The post Social Network Account Stealers Hidden in Android Gaming Hacking Tool appeared first on McAfee Blogs.
Authored by Anuradha M McAfee Labs have observed a new phishing campaign that utilizes macro capabilities available in Microsoft PowerPoint….
The post Malicious PowerPoint Documents on the Rise appeared first on McAfee Blogs.
Authored by Fernando Ruiz McAfee Mobile Malware Research Team has identified malware targeting Mexico. It poses as a security banking tool or as a bank…
The post Android malware distributed in Mexico uses Covid-19 to steal financial credentials appeared first on McAfee Blogs.
Authored by ChanUng Pak McAfee’s Mobile Research team recently found a new Android malware, Elibomi, targeting taxpayers in India. The malware steals sensitive financial and private information via phishing by pretending…
The post Phishing Android Malware Targets Taxpayers in India appeared first on McAfee Blogs.
Co-written by Catherine Huang, Ph.D. and Abhishek Karnik Artificial Intelligence (AI) continues to evolve and has made huge progress over the last decade. AI shapes our daily lives. Deep learning is a subset of techniques in AI that…
The post The Rise of Deep Learning for Detection and Classification of Malware appeared first on McAfee Blogs.
Written by: Lakshya Mathur Excel-based malware has been around for decades and has been in the limelight in recent years. During the second half of 2020, we saw…
The post XLSM Malware with MacroSheets appeared first on McAfee Blogs.
Co-written with Northwave’s Noël Keijzer. Executive Summary For a long time, ransomware gangs were mostly focused on Microsoft Windows operating…
The post Babuk: Biting off More than they Could Chew by Aiming to Encrypt VM and *nix Systems? appeared first on McAfee Blogs.
In 2021 ransomware attacks have been dominant among the bigger cyber security stories. Hence, I was not surprised to see…
The post Fighting new Ransomware Techniques with McAfee’s Latest Innovations appeared first on McAfee Blogs.
The overarching threat facing cyber organizations today is a highly skilled asymmetric enemy, well-funded and resolute in his task and…
The post An Overall Philosophy on the Use of Critical Threat Intelligence appeared first on McAfee Blogs.
This blog was written byVaradharajan Krishnasamy, Karthickkumar, Sakshi Jaiswal Introduction Ransomware attacks are one of the most common cyber-attacks among…
The post REvil Ransomware Uses DLL Sideloading appeared first on McAfee Blogs.
This blog was written by Vallabh Chole & Oliver Devane Over the years, the cybersecurity industry has seen many threats…
The post Hancitor Making Use of Cookies to Prevent URL Scraping appeared first on McAfee Blogs.
This blog was written by Kiran Raj & Kishan N. Introduction In the last few years, Microsoft Office macro malware…
The post Zloader With a New Infection Technique appeared first on McAfee Blogs.
Executive Summary Ryuk is a ransomware that encrypts a victim’s files and requests payment in Bitcoin cryptocurrency to release the…
The post New Ryuk Ransomware Sample Targets Webservers appeared first on McAfee Blogs.
Introduction: ImageMagick is a hugely popular open source software that is used in lot of systems around the world. It…
The post Fuzzing ImageMagick and Digging Deeper into CVE-2020-27829 appeared first on McAfee Blogs.
Introduction Microsoft Windows Graphics Device Interface+, also known as GDI+, allows various applications to use different graphics functionality on video…
The post Analyzing CVE-2021-1665 – Remote Code Execution Vulnerability in Windows GDI+ appeared first on McAfee Blogs.
The McAfee Advanced Threat Research team today published the McAfee Labs Threats Report: June 2021. In this edition we introduce…
The post McAfee Labs Report Highlights Ransomware Threats appeared first on McAfee Blogs.
Executive Summary The McAfee Advanced Threat Research team (ATR) is committed to uncovering security issues in both software and hardware to help developers…
The post A New Program for Your Peloton – Whether You Like It or Not appeared first on McAfee Blogs.
Introduction Virtualization technology has been an IT cornerstone for organization for years now. It revolutionized the way organizations can scale…
The post Are Virtual Machines the New Gold for Cyber Criminals? appeared first on McAfee Blogs.
Summary points: Scammers are increasingly using Windows Push Notifications to impersonate legitimate alerts Recent campaigns pose as a Windows Defender…
The post Scammers Impersonating Windows Defender to Push Malicious Windows Apps appeared first on McAfee Blogs.
Over the past week we have seen a considerable body of work focusing on DarkSide, the ransomware responsible for the…
The post DarkSide Ransomware Victims Sold Short appeared first on McAfee Blogs.
Today, Microsoft released a highly critical vulnerability (CVE-2021-31166) in its web server http.sys. This product is a Windows-only HTTP server…
The post Major HTTP Vulnerability in Windows Could Lead to Wormable Exploit appeared first on McAfee Blogs.
Preface Countries all over the world are racing to achieve so-called herd immunity against COVID-19 by vaccinating their populations. From…
The post “Fool’s Gold”: Questionable Vaccines, Bogus Results, and Forged Cards appeared first on McAfee Blogs.
The Roaming Mantis smishing campaign has been impersonating a logistics company to steal SMS messages and contact lists from Asian…
The post Roaming Mantis Amplifies Smishing Campaign with OS-Specific Android Malware appeared first on McAfee Blogs.