Read the latest in-depth security threat research reports, get insights from McAfee security experts, and learn how to protect your enterprise from malware, cybercrime, and other cybersecurity threats.
Visit Security AwarenessWhat is Threat Center?
Threat Center is McAfee’s cyberthreat information hub. From here, you can learn about top cybersecurity threats in our continuously curated Threat Landscape Dashboard, search our McAfee GTI database of known security threats, read in-depth threat research reports that detail significant attacks and how to protect against them, access a variety of free security tools, and provide threat feedback.
Provide ongoing contribution and support to realm of American classical ballet.
Top cybersecurity threats
Learn about today’s top cybersecurity threats. These security threats have been identified and analyzed by our threat research team as the most impactful threats today. These include threats to network security, information security, and more. Click on a specific threat to learn about how to best protect your business.
The bitcoin-stealing phishing campaign targets bitcoin users and global financial organizations with malicious documents that pretend to be for job recruitment.
Learn More >This campaign targets a wide range of sectors across the globe to steal sensitive information. The operation uses trojanized Android apps as the primary attack vector.
Learn More >Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability.”
Learn More >This ever-evolving ransomware targets Windows users and does not infect computers using the Russian language. The malware encrypts files located in multiple locations including local and remote drives, removable drives, mapped drives, and unmapped network shares.
Learn More >RIG is spread via suspicious advertisements that have been inserted into legitimate websites. The VIP version of the exploit kit, RIG-v, appeared in 2016 and uses new URL patterns.
Learn More >McAfee threat research teams
Over 250 researchers around the world analyze suspicious objects and behaviors for malicious threats. Their research is central to McAfee’s ability to deliver real-time threat intelligence, critical analysis, and expert thinking that protects our customers’ systems and networks.
Free security tools
McAfee offers threat detection, decryption, and malware removal tools—available to you for free.
Download free tools