What's new

McAfee Chief Technology Officer Steve Grobman and Fellow Jon King discuss quantum computing and potential impacts to security as this technology develops.

Resources

Security Awareness

Learn the definitions and functions of key cybersecurity technologies. Such as Endpoint Security Cloud Security, & CASB.

Learn More

Hackable? Season 3

Listen to the new season and learn where you may be susceptible—like key fobs, webcams, and public Wi-Fi—without even realizing it.

Subscribe to Podcast

Free Security Tools

McAfee offers free threat detection, decryption, and malware removal tools.

Download

Top 10 cybersecurity threats

Learn about today’s top cybersecurity threats. These security threats have been identified and analyzed by our threat research team as the most impactful threats today. These include threats to network security, information security, and more. Click on a specific threat to learn about how to best protect your business.

icon-exploit-kit

Exploit Kits

Top toolkits used to exploit system vulnerabilities

icon-campaigns

Campaigns

Top targeted attacks

icon-ransomware

Ransomware

Top malicious ransomware software

icon-vulnerbility

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

test

icon-ransomware

The ransomware, also known as GAmmAWare or DemonWare, demands up to $10,000.00 for the decryption ke...

icon-ransomware

The Avaddon Ransomware-as-a-Service (RaaS) program was discovered being advertised on underground fo...

icon-campaigns

Australian governments and companies are being targeted by a sophisticated, possibly state-based, ac...

icon-campaigns

The Qbot banking trojan has been in operation for more than a decade and continues to target entitie...

icon-campaigns

A new threat group known as "Vendetta" was discovered in early 2020 targeting entities wit...

icon-campaigns

The InvisiMole threat group targeted the military, diplomacy, defense, and government sectors in Eas...

icon-vulnerbility

Adobe Flash Player versions 32.0.0.371 and earlier, 32.0.0.371 and earlier, and 32.0.0.330 and earli...

icon-vulnerbility

A remote code execution vulnerability exists when Microsoft Windows OLE fails to properly validate u...

icon-vulnerbility

An elevation of privilege vulnerability exists in Windows Error Reporting (WER) when WER handles and...

icon-vulnerbility

A privilege escalation vulnerability was discovered in Microsoft Windows. The flaw lies in the Windo...