Access Token Theft and Manipulation Attacks – A Door to Local Privilege Escalation
Executive Summary Many malware attacks designed to inflict damage on a network are armed with lateral movement capabilities. Post initial...
Executive Summary Many malware attacks designed to inflict damage on a network are armed with lateral movement capabilities. Post initial...
Each year, MITRE Engenuity conducts independent evaluations of cybersecurity products to help government and industry make better decisions to combat security...
A new wave of fraudulent apps has made its way to the Google Play store, targeting Android users in Southwest...
In a recent episode of McAfee’s SOCwise Series, guest security expert Chris Crowley revealed findings of his recent survey of security efforts within SOCs....
After experiencing a health scare that changed his life, VP of Technology Services, Paul, vowed to make incremental changes by...
In a year where people relied on their digital lives more than ever before and a dramatic uptick in attacks quickly followed, McAfee’s protection stood strong. We’re proud to...
Throw open the windows and let in some fresh air. It’s time for spring cleaning. And that goes for your...
Cryptocurrency enthusiasts are flocking to the Wild West of Bitcoin and Monero to cash in on the recent gold rush. Bitcoin’s meteoric rise in value is...
Let’s Make Security Easy I’ve been hearing a lot lately about tech and information overload, which is understandable given that...
The McAfee Advanced Threat Research team today published the McAfee Labs Threats Report: April 2021. In this edition, we present...