What is the Threat Center?
The Threat Center is McAfee’s cyberthreat information hub. From here, you can learn about top cybersecurity threats in our continuously curated Threat Landscape Dashboard, search our McAfee Global Threat Intelligence database of known security threats, read in-depth threat research reports, access free security tools, and provide threat feedback.
2020 Threats Predictions
Read our take on ransomware, deepfakes, cloud, and other threat trends on the horizon in 2020.
Read ReportAugust 2019 Report
This edition highlights significant investigative research and trends in threats in Q1 2019.
Read ReportOperation Sharpshooter
Learn about the new global campaign targeting nuclear, defense, energy, and financial companies.
Read ReportResources
Security Awareness
Learn the definitions and functions of key cybersecurity technologies.
Learn MoreHackable? Season 3
Listen to the new season and learn where you may be susceptible—like key fobs, webcams, and public Wi-Fi—without even realizing it.
Subscribe to PodcastFree Security Tools
McAfee offers free threat detection, decryption, and malware removal tools.
DownloadTop 10 cybersecurity threats
Learn about today’s top cybersecurity threats. These security threats have been identified and analyzed by our threat research team as the most impactful threats today. These include threats to network security, information security, and more. Click on a specific threat to learn about how to best protect your business.
Exploit Kits
Top toolkits used to exploit system vulnerabilities
Campaigns
Top targeted attacks
Ransomware
Top malicious ransomware software
Vulnerabilities
Top system weaknesses or flaws targeted by hackers
test
The ransomware uses AES and RSA encryption and demands between 15 and 50 Bitcoin for the decryption ...
The ransomware uses RSA-2048 and ChaCha20 encryption and requires the victim to contact the threat a...
Emissary Panda, also known as APT27 and Lucky Mouse, targeted entities with the ZxShell remote acces...
The APT34 threat group, also known as OilRig or Helix Kitten, are suspected to have targeted compani...
50 domains with ties to the Thallium threat group, also known as APT37 and Reaper, were taken offlin...
A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve ...
An issue was discovered in Citrix Application Delivery Controller (ADC) and Gateway 10.5, 11.1, 12.0...
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: WLS Core...
A memory corruption vulnerability has been discovered in the Microsoft Internet Explorer Scripting E...
A zero-day vulnerability has been discovered in Mozilla Firefox. The critical flaw is due to a type ...