McAfee Labs 2020 Threats Predictions

Key trends to watch in 2020 include:

  • Less-skilled threat actors will have more access and broader capabilities to create and weaponize deepfake content
  • Adversaries will use artificial intelligence to produce extremely realistic text, images, and videos capable of bypassing facial recognition technology
  • More ransomware attacks will morph into two-stage extortion campaigns
  • DevSecOps will rise to prominence as growth in containerized workloads causes security controls to "shift left"
  • Application Programming Interfaces (API) will be exposed as the weakest link leading to cloud-native threats
Read Report

McAfee Labs 2020 Threats Predictions

Example of underground ad offering access to an Asian Food, Consumer and Industrial company

Archived predictions

2019 Threats Predictions

Synergistic threats, extortion attempts, and data exfiltration are among the topics covered in our 2019 predictions.

Read Report

2018 Threats Predictions

Topics include how the adversarial machine learning arms race is heating up, how ransomware is pivoting to new targets, and more.

Read Report

2017 Threats Predictions

Cloud threats, internet of things (IoT) threats regulations, and vendor response are covered in our 2017 predictions.

Read Report

McAfee Labs 2019 Threats Predictions

As our dependency on technology grows, breaches are no longer limited to a specific platform or device. Everything is connected and everything is a target for cybercriminals, who are increasingly collaborating to escalate their efforts. Learn how our McAfee Labs researchers think the threats landscape will evolve in 2019.

Key trends to watch in 2019 include:

  • Mobile phones and digital assistants will become the next vectors for home IoT attacks
  • Criminal underground will consolidate, creating more partnerships to fuel cybercrime
  • Artificial intelligence will aid cybercriminal evasion techniques
  • Misinformation campaigns will target wider audiences—such as individual companies—in a new hunting ground for malicious actors
  • Increased use of multifaceted or synergistic attacks will cause confusion and hide ultimate attack goals
  • The cloud and data-rich identity platforms will become the primary battlegrounds for data breaches
Read ReportDownload Infographic