McAfee Labs has noticed a significant shift by some actors toward using trusted Windows executables, rather than external malware, to attack systems. One of the most popular techniques is a “file
Tag: Cybersecurity
Thanks to my colleague Christiaan Beek for his advice and contributions.
While researching underground hacker marketplaces, the McAfee Advanced Threat Research team has discovered that access
In the McAfee Labs Threats Report June 2018, published today, we share investigative research and threat statistics gathered by the McAfee Advanced Threat Research and McAfee Labs teams in Q1 of th
Every week we read about adversaries attacking their targets as part of online criminal campaigns. Information gathering, strategic advantage, and theft of intellectual property are some of the mot