What's new

Resources

Security Awareness

Learn the definitions and functions of key cybersecurity technologies. Such as Endpoint Security Cloud Security, & CASB.

Learn More

Hackable? Season 3

Listen to the new season and learn where you may be susceptible—like key fobs, webcams, and public Wi-Fi—without even realizing it.

Subscribe to Podcast

Free Security Tools

McAfee offers free threat detection, decryption, and malware removal tools.

Download

Top 10 cybersecurity threats

Learn about today’s top cybersecurity threats. These security threats have been identified and analyzed by our threat research team as the most impactful threats today. These include threats to network security, information security, and more. Click on a specific threat to learn about how to best protect your business.

icon-exploit-kit

Exploit Kits

Top toolkits used to exploit system vulnerabilities

icon-campaigns

Campaigns

Top targeted attacks

icon-ransomware

Ransomware

Top malicious ransomware software

icon-vulnerbility

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

test

icon-ransomware

The ransomware will perform reconnaissance on the targeted network, exfiltrate sensitive information...

icon-ransomware

The ransomware, also known as Netwalker, targets enterprise networks and encrypts all Microsoft Wind...

icon-ransomware

The ransomware was discovered in mid-2020 and is a rebranded version of PwndLocker. The ransom for t...

icon-ransomware

The Ransomware-as-a-Service (RaaS) hit the threat landscape in September 2019 and was discovered to ...

icon-campaigns

Telecommunication companies in South Asia were targeted by the Greenbug espionage group with multipl...

icon-campaigns

The Outlaw Hacking Group infected multiple regions around the world with a new version of malicious ...

icon-campaigns

A new campaign was discovered using a company’s Mobile Device Manager (MDM) server to distribute mal...

icon-campaigns

A campaign was discovered targeting the European region with spear-phishing emails using the coronav...

icon-vulnerbility

An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly all...

icon-vulnerbility

A security feature bypass vulnerability exists in Microsoft Windows when the Task Scheduler service ...