McAfee 威胁中心


McAfee Labs 威胁报告:2017 年 12 月


Verizon 2017 数据泄露调查报告




请阅读最新的深入安全威胁研究报告,了解来自 McAfee 安全专家的见解,并学习如何防止您的企业受到恶意软件、网络犯罪以及其他网络安全威胁的侵害。



威胁中心是 McAfee 的网络威胁信息中心。在此,您可在我们不断策展的威胁形势信息显示板中了解最大的网络安全威胁,搜索我们已知安全威胁的 McAfee GTI 数据库,阅读深入的威胁研究报告(详细介绍了影响最大的攻击以及防御方法),访问各种免费安全工具并提供威胁反馈。


深入分析各种情景,看看公共 Wi-Fi、车载网络和网络摄像头等容易遭到攻击的程度。Hackable?观看我们的全新播客系列节目,探索我们在日常生活中容易受到影响的地方,您甚至不会意识到这些地方可能会受到攻击。




The campaign uses a malicious Word document that leverages the Microsoft Office Dynamic Data Exchange (DDE) technique to bypass network defenses. Regardless of whether macros are enabled or not, the use of DDE with PowerShell allows an attacker to execute arbitrary code on a victim’s system.

Learn More >

Targeted attacks primarily focused on financial institutions and technology organizations within Saudi Arabia. Artifacts identified within the malware samples related to these attacks also suggest the targeting of the defense industry in Saudi Arabia. This appears to be related to an earlier wave of attacks carried out in fall 2015.

Learn More >

An issue was discovered in certain Apple products. MacOS High Sierra before Security Update 2017-001 is affected. The issue involves the "Directory Utility" component. It allows attackers to obtain administrator access without a password via certain interactions involving entry of the root username.

Learn More >

This ever-evolving ransomware targets Windows users and does not infect computers using the Russian language. The malware encrypts files located in multiple locations including local and remote drives, removable drives, mapped drives, and unmapped network shares.

Learn More >

The exploit kit attempts to exploit victims who visit malicious websites with various vulnerabilities found in Microsoft, Oracle, and Adobe.

Learn More >

Search the Threat Library

(Example: W32/Espace.worm)

McAfee 威胁研究团队

全球 250 多个研究员对恶意威胁的可疑对象和行为进行了分析。他们的研究是 McAfee 能够提供实时威胁情报、关键分析以及专家思想,从而为客户系统和网络提供保护的关键。

McAfee Labs 高级威胁研究团队


McAfee 提供威胁检测、解密和恶意软件移除工具 - 为您免费供应。


McAfee Labs 博客