McAfee Threat Center

Discover the latest in security threats

McAfee Labs Threats Report: March 2018

Learn More

Verizon 2017 Data Breach Investigations Report

Download Report

What You Need to Know About Ransomware

Learn More

Read the latest in-depth security threat research reports, get insights from McAfee security experts, and learn how to protect your enterprise from malware, cybercrime, and other cybersecurity threats.

Visit Security Awareness

What is Threat Center?

Threat Center is McAfee’s cyberthreat information hub. From here, you can learn about top cybersecurity threats in our continuously curated Threat Landscape Dashboard, search our McAfee GTI database of known security threats, read in-depth threat research reports that detail significant attacks and how to protect against them, access a variety of free security tools, and provide threat feedback.

Hackable?

Go behind the scenes to see how easy it is to hack into public Wi-Fi, cars, webcams, and more. Hackable?, our new podcast series, explores where we’re susceptible in our daily routines, without even realizing it.

Top cybersecurity threats

Learn about today’s top cybersecurity threats. These security threats have been identified and analyzed by our threat research team as the most impactful threats today. These include threats to network security, information security, and more. Click on a specific threat to learn about how to best protect your business.

 

The bitcoin-stealing phishing campaign targets bitcoin users and global financial organizations with malicious documents that pretend to be for job recruitment.

Learn More >

This campaign targets a wide range of sectors across the globe to steal sensitive information. The operation uses trojanized Android apps as the primary attack vector.

Learn More >

Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability.”

Learn More >

This ever-evolving ransomware targets Windows users and does not infect computers using the Russian language. The malware encrypts files located in multiple locations including local and remote drives, removable drives, mapped drives, and unmapped network shares.

Learn More >

RIG is spread via suspicious advertisements that have been inserted into legitimate websites. The VIP version of the exploit kit, RIG-v, appeared in 2016 and uses new URL patterns.

Learn More >

Search the Threat Library

(Example: W32/Espace.worm)

McAfee threat research teams

Over 250 researchers around the world analyze suspicious objects and behaviors for malicious threats. Their research is central to McAfee’s ability to deliver real-time threat intelligence, critical analysis, and expert thinking that protects our customers’ systems and networks.

McAfee Labs Advanced Threat Research Team

Free security tools

McAfee offers threat detection, decryption, and malware removal tools—available to you for free.

Download free tools

McAfee Labs blog