Read the latest in-depth security threat research reports, get insights from McAfee security experts, and learn how to protect your enterprise from malware, cybercrime, and other cybersecurity threats.
Visit Security AwarenessWhat is Threat Center?
Threat Center is McAfee’s cyberthreat information hub. From here, you can learn about top cybersecurity threats in our continuously curated Threat Landscape Dashboard, search our McAfee GTI database of known security threats, read in-depth threat research reports that detail significant attacks and how to protect against them, access a variety of free security tools, and provide threat feedback.
Cybersecurity threats
Learn about today’s top cybersecurity threats. These security threats have been identified and analyzed by our threat research team as the most impactful threats today. These include threats to network security, information security, and more. Click on a specific threat to learn about how to best protect your business.
Exploit Kits
Top toolkits used to exploit system vulnerabilities
Campaigns
Top targeted attacks
Ransomware
Top malicious ransomware software
Vulnerabilities
Top system weaknesses or flaws targeted by hackers
Top 10 Threats
The ransomware appends ".aes128ctr" to infected files and requires the victim to email the threat actor for the decrypti...
The ransomware appends a random extension to encrypted files and reports to double the price of the ransom if not paid on time. Th...
The threat group behind the campaign has been in operation since at least 2012 and initially focused on attacking the video game i...
A cyber espionage operation was discovered targeting the government, military, education, police, and foreign affairs sectors in t...
The Cloud Atlas threat group was discovered targeting multiple sectors with spear-phishing emails that contained malicious Microso...
The Silence Group has been in operation since at least 2016 and target financial institutions in multiple countries around the wor...
The Lord exploit kit was discovered in mid-2019 and leverages a use-after-free vulnerability in Adobe Flash Player classified unde...
A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenti...
A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenti...
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not...
McAfee threat research teams
Over 250 researchers around the world analyze suspicious objects and behaviors for malicious threats. Their research is central to McAfee’s ability to deliver real-time threat intelligence, critical analysis, and expert thinking that protects our customers’ systems and networks.
Free security tools
McAfee offers threat detection, decryption, and malware removal tools—available to you for free.
Download free tools