large-logo-mcafee-dark

Threat Landscape Dashboard

Assessing today's threats and the relationships between them

icon-exploit-kit

Exploit Kits

Top toolkits used to exploit system vulnerabilities

icon-campaigns

Campaigns

Top targeted attacks

icon-ransomware

Ransomware

Top malicious ransomware software

icon-vulnerbility

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

Top 10 Threats

icon-ransomware

The ransomware appends various extensions to infected files and is a variant of CrySiS. The malware has been in operation since 20...

icon-ransomware

The ransomware uses AES encryption and adds one of more than 20 different extensions to infected files. The malicious software was...

icon-ransomware

The ransomware also known as "Enc_RobbinHood" or "RobbinHood" demands 0.8 Bitcoin for the decryption key and a...

icon-vulnerbility

A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an appl...

icon-ransomware

The ransomware appends a random extension to encrypted files and reports to double the price of the ransom if not paid on time. Th...

icon-campaigns

The campaign targeted multiple embassies and government officials in Europe with a malicious attachment carried in spear-phishing ...

icon-campaigns

The threat group continues to attack hundreds of companies with spear-phishing emails although members were arrested in 2018. The ...

icon-vulnerbility

Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions...

icon-vulnerbility

The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 ...

icon-vulnerbility

A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticate...