large-logo-mcafee

McAfee Threat Center

Discover the latest in security threats

man-woman-talking-ipad

McAfee Labs Threats Report: August 2019

Read Report
security-breach-in-monitor

McAfee Labs 2019 Threats Predictions Report

Read Report
soc-2males-monitors

Operation Sharpshooter

Read Report

Read the latest in-depth security threat research reports, get insights from McAfee security experts, and learn how to protect your enterprise from malware, cybercrime, and other cybersecurity threats.

Visit Security Awareness

What is Threat Center?

Threat Center is McAfee’s cyberthreat information hub. From here, you can learn about top cybersecurity threats in our continuously curated Threat Landscape Dashboard, search our McAfee GTI database of known security threats, read in-depth threat research reports that detail significant attacks and how to protect against them, access a variety of free security tools, and provide threat feedback.

hackable

Hackable? Season 3

Our award-winning podcast is here to answer the question, “Is it Hackable?” Listen to the new season and learn where you may be susceptible—from key fobs and webcams to public Wi-Fi and more—without even realizing it.

Cybersecurity threats

Learn about today’s top cybersecurity threats. These security threats have been identified and analyzed by our threat research team as the most impactful threats today. These include threats to network security, information security, and more. Click on a specific threat to learn about how to best protect your business.

icon-exploit-kit

Exploit Kits

Top toolkits used to exploit system vulnerabilities

icon-campaigns

Campaigns

Top targeted attacks

icon-ransomware

Ransomware

Top malicious ransomware software

icon-vulnerbility

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

Top 10 Threats

icon-ransomware

The ransomware uses AES and RSA encryption and demands between 15 and 50 Bitcoin for the decryption key. The malicious software ki...

icon-ransomware

The ransomware appends a random extension to encrypted files and reports to double the price of the ransom if not paid on time. Th...

icon-ransomware

The ransomware drops a ransom note labeled "NEMTY-DECRYPT.txt" and requires the victim to open the threat actors .onion ...

icon-campaigns

The COBALT DICKENS threat group, also known as Silent Librarian, sent spear-phishing emails to universities in multiple countries ...

icon-campaigns

The Stealth Falcon threat group has been in operation since at least 2012 and target multiple sectors located in the Middle East. ...

icon-campaigns

On Monday, September 9, 2019 the US Department of Homeland Security (DHS) released a report on possible malicious activity and pre...

icon-vulnerbility

Exim before 4.92.2 allows remote attackers to execute arbitrary code as root via a trailing backslash.

icon-vulnerbility

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remo...

icon-vulnerbility

An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in...

icon-vulnerbility

An elevation of privilege vulnerability exists in the way that ws2ifsl.sys (Winsock) handles objects in memory, aka 'Windows E...

Search the Threat Library

(Example: W32/Espace.worm)

McAfee threat research teams

Over 250 researchers around the world analyze suspicious objects and behaviors for malicious threats. Their research is central to McAfee’s ability to deliver real-time threat intelligence, critical analysis, and expert thinking that protects our customers’ systems and networks.

McAfee Labs Advanced Threat Research Team

Free security tools

McAfee offers threat detection, decryption, and malware removal tools—available to you for free.

Download free tools

McAfee Labs Blog