Protect data and stop threats in the cloud
Secure sensitive data everywhere it resides
Detect, prevent, and correct advanced threats
Intrusion prevention and detection
Gain complete security visibility
Discover and protect server and cloud workloads
Identify attacks and share insights
Actionable data to prioritize and investigate threats
Secure web access from any device
Customer and technical support programs, terms, and documentation
Resources to help you upgrade to the latest versions of McAfee security solutions
Best practices, troubleshooting, and issue-related articles
Release notes, installation, and product guides
Articles addressing product vulnerabilities
Current and past product releases, pro tips, and end-of-life notices
Real-time cloud service status
Analysis on current threats
Top targeted attacks
Top toolkits used to exploit system vulnerabilities
Top system weaknesses or flaws targeted by hackers
Top malicious ransomware software
Quarterly analysis on threat trends
Collaborating with partners for better security
Access training, sales, and marketing resources developed for McAfee partners
Access the ServicePortal for technical support
Assessing today's threats and the relationships between them
The ransomware appends various extensions to infected files and is a variant of CrySiS. The malware has been in operation since 20...
The ransomware appends random extensions to encrypted files and directs the victim to an html file for instructions on how to decr...
The McAfee Advanced Threat Research team and McAfee Labs Malware Operations Group have discovered a new global campaign targeting ...
The ransomware, also known as Worker32, uses both AES and RSA encryption and appends ".locked" to infected files. The ra...
The campaign's goal is to steal confidential information and targets a range of sectors including government and defense with ...
The attack campaign was carried out by the Whitefly espionage group and targeted a range of sectors including healthcare, media, t...
The exploit kit was discovered in early 2019 and exploits a flaw in Adobe Flash Player to drop the GootKit Trojan. A Microsoft Win...
In WinRAR versions prior to and including 5.61, There is path traversal vulnerability when crafting the filename field of the ACE ...
A remote code execution vulnerability has been discovered in Adobe ColdFusion 11, 2016, and 2018. The flaw is due to how file uplo...
A remote code execution vulnerability has been discovered in Google Chrome. The flaw is due to a Use-After-Free defect in the File...