Posts Tagged 'global threat intelligence'
The Intel Security Advanced Threat Research Team has discovered a critical signature forgery vulnerability in the Mozilla Network Security Services (NSS) crypto library that could allow malicious parties to set up fraudulent sites masquerading as legitimate businesses and other organizations. The Mozilla NSS library, commonly utilized in the Firefox web browser, can also be found […]
Recently, the McAfee Advanced Exploit Detection System (AEDS) has delivered some interesting RTF files to our table. These RTFs have executables “attached” to the documents. Usually, some words in the documents try to convince users to click and run the attachments. The following figure shows the point at which a user clicks on the attachment. […]
McAfee product coverage and mitigations for malware or indicators associated with the recent attacks (a.k.a. Dragonfly, Energetic Bear, Havex/SYSMain) on industrial control systems (ICS’s) are listed below. The Havex remote access tool is common across these associated attacks or campaigns–including Dragonfly. We have seen Havex in ICS-specific targeted campaigns. It can detect and affect ICS- […]
This week the world’s largest mobile and influential security conferences took place; Mobile World Congress, and RSA. At Mobile World Congress we reached an important milestone toward achieving the McAfee and Intel vision of providing ubiquitous security and identity protection for individuals and businesses on all computing devices. During his pre-show keynote at CES in January, Intel […]
This week, the city of San Francisco is hosting one of the biggest cybersecurity events of the year – the RSA conference. The meeting draws hundreds of prominent cyber exhibitors and thousands of guests, spurring a discussion on the cyberthreat landscape and the solutions companies are employing to keep us safe from bad actors on […]
Most malware is created for economic purposes. To name just a few of our reports and blogs on this topic, we have written about Cybercrime Exposed, stolen data, and the Target point-of-sale malware. But sometimes it’s not clear to our customers how much time and skill malware authors invest in their tools. A recent case […]