What's new

MVISION Insights Preview

Explore a preview of the only proactive solution to stay ahead of emerging threats.

McAfee Chief Technology Officer Steve Grobman and Fellow Jon King discuss quantum computing and potential impacts to security as this technology develops.

Resources

Security Awareness

Learn the definitions and functions of key cybersecurity technologies. Such as Endpoint Security, Cloud Security, & CASB.

Learn More

Hackable? Season 3

Listen to the new season and learn where you may be susceptible—like key fobs, webcams, and public Wi-Fi—without even realizing it.

Subscribe to Podcast

Free Security Tools

McAfee offers free threat detection, decryption, and malware removal tools.

Download

Top 10 cybersecurity threats

Learn about today’s top cybersecurity threats. These security threats have been identified and analyzed by our threat research team as the most impactful threats today. These include threats to network security, information security, and more. Click on a specific threat to learn about how to best protect your business.

icon-exploit-kit

Exploit Kits

Top toolkits used to exploit system vulnerabilities

icon-campaigns

Campaigns

Top targeted attacks

icon-ransomware

Ransomware

Top malicious ransomware software

icon-vulnerbility

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

test

icon-ransomware

The ransomware uses AES encryption and adds various extensions to infected files. The malware was di...

icon-ransomware

Snatch ransomware has been identified using brute force tactics over RDP to gain access to Domain Ad...

icon-ransomware

A new ransomware family was discovered targeting MacIntosh users and is packaged inside legitimate s...

icon-campaigns

In mid-2020 companies in China were targeted with the GoldenSpy malware hidden inside of legitimate ...

icon-campaigns

A skimming operation was discovered hiding malicious code within EXIF metadata on multiple websites ...

icon-campaigns

The Tetrade Campaign consisted of four banking trojan families which attacked users located across t...

icon-campaigns

The APT29 threat group, also known as Cozy Bear, targeted a range of sectors across Canada, Great Br...

icon-vulnerbility

A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to...

icon-vulnerbility

SAP NetWeaver AS JAVA (LM Configuration Wizard), versions - 7.30, 7.31, 7.40, 7.50, does not perform...

icon-vulnerbility

In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11...