Securing Tomorrow. Today.

Buran Ransomware; the Evolution of VegaLocker

McAfee’s Advanced Threat Research Team observed how a new ransomware family named ‘Buran’ appeared in May 2019. Buran works as a RaaS model like other ransomware families such as REVil, GandCrab (now defunct), Phobos, etc.

Read Blog
Family Safety

7 Ways to Wreck a Cybercrook’s Holidays

’Tis the season for giving and who better to give a giant headache to than the digital scammers working overtime to wreck our holidays? Can we spot and unravel every scam out there? Probably not. But, by taking a few minutes to get equipped to click, we can dodge common ...

Consumer Threat Notices

Beat Black Friday Scammers: Secure Your Online Purchases From Fake Payment Processors

They see you when you’re shopping, they know when you click “pay” – cybercriminals, that is. With Black Friday and Cyber Monday deals flooding the internet, malicious actors have many opportunities to exploit users rushing to purchase gifts for family and friends. And according to Ars Technica, thieves have devised ...

Endpoint Security

Response Required: Why Identifying Threats With Your EDR Isn’t Enough

The perpetrator was a master of disguise, outfitting himself as an employee to bypass the extensive preventive security controls and flee with the contents of the vault. Fortunately, the building was equipped with strong detection security measures, and the burglar—unaware of the location of a laser tripwire—soon set off a ...

Family Safety

Could Your Child be Sexting? Signs to Look for and Ways to Respond

Oh, what we wouldn’t do to travel back in time to the days before smartphones kid-jacked our families, right? But here we are. Our kids are forever connected. And, it’s up to parents to help them navigate the risks — one of which is sexting. Ouch. Even reading the word ...

Consumer Threat Notices

2.2 Million Users Affected By Latest Data Exposure: 4 Tips to Stay Secure

The digitalization of data allows it to move effortlessly and be accessed from devices and places around the world within a matter of seconds. This also makes it possible for businesses, organizations, and even individuals to collect and analyze this data for a variety of reasons. However, not all of ...

Enterprise

The AI (R)evolution: Why Humans Will Always Have a Place in the SOC

In cybersecurity, the combination of men, women and machines can do what neither can do alone — form a complementary team capable of upholding order and fighting the forces of evil. The 20th century was uniquely fascinated with the idea of artificial intelligence (AI). From friendly and helpful humanoid machines ...

Hackable? Podcast

Are Smart Padlocks Secure Enough to Protect Your Packages?

“Hackable?” host Geoff Siskind likes to shop online. A lot. What he doesn’t like is how often his packages are stolen from his front porch. Desperate for a solution, he’s intrigued by smart padlocks that promise to protect packages. But after five seasons of hosting “Hackable?” Geoff is skeptical that ...

Consumer Threat Notices

This Holiday Season, Watch Out for These Cyber-Grinch Tricks

Whether it be that their shoes are too tight, their heads aren’t screwed on just right, or they’re expressing a little bit of “Bah Humbug,” cyber-grinches and cyber-scrooges everywhere view the holiday season as a perfect opportunity to exploit users. In fact, McAfee recently conducted a survey of over 1,000 ...

Consumer Threat Notices

‘Tis the Season for Cybersecurity: Stay Protected This Holiday Season

It’s beginning to look a lot like the holiday season – and with the holidays comes various opportunities for cyber-scrooges to exploit. While users prepare for the festivities, cybercriminals look for opportunities to scam holiday shoppers with various tricks. To shed more light on how these crooks are putting a ...

Endpoint Security

Threat Hunting or Efficiency: Pick Your EDR Path?

“Do You Want It Done Fast, Or Do You Want It Done Right?” “Yes.” “Help out more with our business objectives.” “Cover an increasing number of endpoints.” “Cut budgets.” “Make it all work without adding staff.” Cybersecurity teams face a lot of conflicting objectives—both within their teams and from upper ...

Subscribe to McAfee Securing Tomorrow Blogs