What is the Threat Center?

The Threat Center is McAfee’s cyberthreat information hub. From here, you can learn about top cybersecurity threats in our continuously curated Threat Landscape Dashboard, search our McAfee Global Threat Intelligence database of known security threats, read in-depth threat research reports, access free security tools, and provide threat feedback.

2020 Threats Predictions

Read our take on ransomware, deepfakes, cloud, and other threat trends on the horizon in 2020.

Read Report

August 2019 Report

This edition highlights significant investigative research and trends in threats in Q1 2019.

Read Report

Operation Sharpshooter

Learn about the new global campaign targeting nuclear, defense, energy, and financial companies.

Read Report

Resources

Security Awareness

Learn the definitions and functions of key cybersecurity technologies.

Learn More

Hackable? Season 3

Listen to the new season and learn where you may be susceptible—like key fobs, webcams, and public Wi-Fi—without even realizing it.

Subscribe to Podcast

Free Security Tools

McAfee offers free threat detection, decryption, and malware removal tools.

Download

Top 10 cybersecurity threats

Learn about today’s top cybersecurity threats. These security threats have been identified and analyzed by our threat research team as the most impactful threats today. These include threats to network security, information security, and more. Click on a specific threat to learn about how to best protect your business.

icon-exploit-kit

Exploit Kits

Top toolkits used to exploit system vulnerabilities

icon-campaigns

Campaigns

Top targeted attacks

icon-ransomware

Ransomware

Top malicious ransomware software

icon-vulnerbility

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

test

icon-ransomware

The ransomware will perform reconnaissance on the targeted network, exfiltrate sensitive information...

icon-ransomware

The ransomware, also known as Netwalker, targets enterprise networks and encrypts all Microsoft Wind...

icon-campaigns

The Fox Kitten Campaign targeted multiple sectors around the world including information technology,...

icon-campaigns

The United States Government released an updated report attributed to the HIDDEN COBRA threat actor,...

icon-campaigns

The APT33 threat group, also known as Elfin, Refined Kitten, Magnallium, and Holmium, is suspected t...

icon-campaigns

A cyberespionage campaign targeting the gambling sector in Asia was discovered using a range of tool...

icon-vulnerbility

An elevation of privilege vulnerability exists in the Windows Installer when MSI packages process sy...

icon-vulnerbility

An information vulnerability exists when Windows Modules Installer Service improperly discloses file...

icon-vulnerbility

Adobe Flash Player versions 32.0.0.321 and earlier, 32.0.0.314 and earlier, 32.0.0.321 and earlier, ...

icon-vulnerbility

smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows ...