22 tech luminaries we lost in 2025
As modern technologies such as artificial intelligence grab today’s headlines, it’s worth remembering that their foundations were being laid more than half a century ago by computer scientists, philosophers, psychologists, developers, entrepreneurs, and more. These pioneers and those who followed tackled issues and solved problems that future generations may never know existed — but without their […] more…10 advanced Android clipboard tricks
You’d never know it, but one of the most potential-packed parts of your favorite Android phone is a feature you rarely actually see. It’s mostly invisible by design, in fact — and yet, if you teach yourself how to tap into it, you’ll save time, increase your efficiency, and feel like a total smartphone sorcerer. […] more…An unwelcome megatrend: AI that replaces family, friends — and pets
I’ve already told you about the Dead Internet Theory, the false conspiracy theory that might as well be true. The Dead Internet Theory claims that secret government or corporate conspirators are trying to replace people on the internet with bots and AI to “manipulate public perception, control narratives, and influence the public’s behavior.” The conspiracy part […] more…Microsoft Planner cheat sheet: How to get started
Remember when “planning” at work meant sticky notes plastered across your monitor and endless email threads about who’s doing what? As it is wont to do, Microsoft has “reimagined” the sea of Post-it notes as a fairly sophisticated set of software planning tools, and the result is something that might actually make you less resistant […] more…14 Google Play Store secrets for smarter Android app management
When you think about hidden tricks and little-known features on Android, the Google Play Store probably isn’t the first place that comes to mind. And why would it? The Play Store seems like a simple utility — a place where you go when you’ve got something you want to download or an app update you’re […] more…Uncovering a Colombian Malware Campaign with AI Code Analysis
VirusTotal Code Insight keeps adding new file formats. This time, we’re looking at two vector-based formats from very different eras: SWF and SVG. Curiously, right after we rolled out this update in production, one of the very first submitted files gave us a perfect, and unexpected, example of Code Insight in action: it uncovered an […] more…Applying AI Analysis to PDF Threats
In our previous post we extended VirusTotal Code Insights to browser extensions and supply-chain artifacts. A key finding from that analysis was how our AI could apply contextual knowledge to its evaluation. It wasn’t just analyzing code in isolation, it was correlating a package’s stated purpose (its name and description) with its actual behavior, flagging […] more…Code Insight Expands to Uncover Risks Across the Software Supply Chain
Audio version of this post, created with NotebookLM Deep Dive Your browser does not support the audio element. When we launched Code Insight, we started by analyzing PowerShell scripts. Since then, we have been continuously expanding its capabilities to cover more file types. Today, we announce that Code Insight can now analyze a broader range […] more…Tracking Threat Actors Using Images and Artifacts
When tracking adversaries, we commonly focus on the malware they employ in the final stages of the kill chain and infrastructure, often overlooking samples used in the initial ones. In this post, we will explore some ideas to track adversary activity leveraging images and artifacts mostly used during delivery. We presented this approach at the […] more…Inside of the WASP’s nest: deep dive into PyPI-hosted malware
Photo by Matheus Queiroz on Unsplash In late 2022 we decided to start monitoring PyPI, arguably the most important Python repository, as there were a number of reports on it hosting malware. PyPI took exceptional relevance amongst all repositories as, historically, it was trusted by default by many software developers. Any security breach or abuse […] more…The metaverse: Not dead yet
The metaverse has been described as the next phase of the internet: interconnected and persistent 3D spaces where we will work, play, and, so it seems, purchase virtual real estate. But metaverse-related technologies have failed to keep up with the considerable hype, the vision of ultrarealistic virtual environments offered by tech vendors miles away from […] more…Meta Awards $27,000 Bounty for 2FA Bypass Vulnerability
A researcher has disclosed the details of a two-factor authentication (2FA) vulnerability that earned him a $27,000 bug bounty from Facebook parent company Meta. Gtm Manoz of Nepal discovered in September 2022 that a system designed by Meta for confirming a phone number and email address did not have any rate-limiting protection. A fix was […] more…Lessons learned from 2022
One of our goals is sharing with the security community as much as we learn from VirusTotal’s data to help stop, monitor and mitigate malicious activity. When looking back to 2022 we observe different interesting trends; we decided to go deeper into the three most interesting ones: evolution of distribution vectors, trending malware artifacts and […] more…McAfee 2023 Threat Predictions: Evolution and Exploitation
As 2022 draws to a close, the Threat Research Team at McAfee Labs takes a look forward—offering their predictions for 2023 and how its threat landscape may take shape. This year saw the continued evolution of scams, which is unlikely to slow down, as well as greater adoption of Chrome as an operating system. It […] more…New Malicious Clicker found in apps installed by 20M+ users
Authored by SangRyol Ryu Cybercriminals are always after illegal advertising revenue. As we have previously reported, we have seen many mobile malwares masquerading as a useful tool or utility, and automatically crawling ads in the background. Recently the McAfee Mobile Research Team has identified new Clicker malware that sneaked into Google Play. In total 16 […] more…New HiddenAds malware affects 1M+ users and hides on the Google Play Store
Authored by Dexter Shin McAfee’s Mobile Research Team has identified new malware on the Google Play Store. Most of them are disguising themselves as cleaner apps that delete junk files or help optimize their batteries for device management. However, this malware hides and continuously show advertisements to victims. In addition, they run malicious services automatically […] more…More information
- Voice Services Momentary Interruption
- FBI dispute with DNC over hacked servers may fuel doubt on Russia role
- Mozilla investing in Everything.me
- API Security Firm Salt Security Raises $30 Million in Series B Funding
- China-linked Hackers Target Engineering and Maritime Industries
- Congress Wants a New Email Privacy Act—But the Next Attorney General Won’t
- Buyer’s guide: How to choose the right business laptops
- Vulnerability Management Fatigue Fueled by Non-Exploitable Bugs
- Get root on an OS X 10.10 Mac: The exploit is so trivial it fits in a tweet
- This is why Apple will lead the business market