large-logo-mcafee

McAfee 威胁中心

探索安全威胁的最新信息

security-breach-in-monitor

McAfee Labs 2019 年威胁预测报告

阅读报告
man-woman-talking-ipad

McAfee Labs 威胁报告:2018 年 9 月

阅读报告
business-male-female-tablet-talking

Blockchain:新技术、新风险

阅读报告

请阅读最新的深入安全威胁研究报告,了解来自 McAfee 安全专家的见解,并学习如何防止您的企业受到恶意软件、网络犯罪以及其他网络安全威胁的侵害。

访问安全意识

什么是“威胁中心”?

威胁中心是 McAfee 的网络威胁信息中心。 在此,您可在我们不断策展的威胁形势信息显示板中了解最大的网络安全威胁,搜索我们已知安全威胁的 McAfee GTI 数据库,阅读深入的威胁研究报告(详细介绍了影响最大的攻击以及防御方法),访问各种免费安全工具并提供威胁反馈。

hackable

容易遭到攻击? 第 3 季

我们屡获大奖的播客回答了下面的问题:“容易遭到攻击吗?”听听新一季播客,了解从密钥卡、网络摄像头到公共 Wi-Fi 等,您在哪些自己都没有发觉的方面安全防御薄弱。

最大网络安全威胁

了解如今的最大网络安全威胁 我们的威胁研究团队已经确定并分析了当今影响最大的安全威胁。 其中包括影响网络安全、信息安全等的威胁。 单击特定威胁,了解如何让您的业务获得最佳保护效果。

icon-exploit-kit

This exploit kit was discovered in August 2018 and takes advantage of flaws in Adobe Flash Player and Microsoft Windows. A successful infection will allow the attacker to download additional malware onto the victim's computer.

了解更多信息 >
icon-campaigns

This campaign reuses a portion of code from the Seasalt implant (circa 2010) that is linked to the Chinese hacking group Comment Crew. Oceansalt appears to have been part of an operation targeting South Korea, the United States, and Canada in a well-focused attack.

了解更多信息 >
icon-exploit-kits

This exploit kit is used to create malicious Microsoft Office documents in an attempt to exploit a range of Microsoft vulnerabilities. The builder is sold on the Dark Web and has been used to infect victims with various malware including FormBook, Loki Bot, Trickbot, and Chthonic.

了解更多信息 >
icon-ransomware

This ransomware uses AES encryption and adds various extensions to infected files. In November 2017 it was discovered that the Necurs botnet was used to spread the malicious software. Multiple variants of the ransomware continue to appear on the threat landscape.

了解更多信息 >
icon-ransomware

This ransomware appends random extensions to encrypted files and directs the victim to an HTML file for instructions on how to decrypt infected files. The threat actor demands $800 in either bitcoin or DASH for the decryption key. GandCrab 5 also scans network shares and mapped drives to find files to encrypt. The threat actors behind the ransomware use a variety of infection vectors including PowerShell, botnets, exploit kits, Trojanized programs, spear phishing, and remote desktop.

了解更多信息 >

搜索威胁库

(示例:W32/Espace.worm)

McAfee 威胁研究团队

全球 250 多个研究员对恶意威胁的可疑对象和行为进行了分析。 他们的研究是 McAfee 能够提供实时威胁情报、关键分析以及专家思想,从而为客户系统和网络提供保护的关键。

McAfee Labs Advanced Threat Research 团队

免费安全工具

McAfee 提供威胁检测、解密和恶意软件移除工具 - 为您免费供应。

下载免费工具

McAfee Labs 博客