Top 10 Threats
The ransomware targets a range of sectors including healthcare, industrial control, and government. The malicious software seeks o...
The exploit kit is used to create malicious Microsoft Office documents in an attempt to exploit a range of Microsoft vulnerabiliti...
The exploit kit protects its own exploit code and C2 traffic with RSA encryption and takes advantage of flaws in Microsoft Interne...
The ransomware uses AES and RSA encryption and demands between 15 and 50 Bitcoin for the decryption key. The malicious software ki...
The ransomware appends random extensions to encrypted files and directs the victim to an html file for instructions on how to decr...
The exploit kit was discovered in August 2018 and takes advantage of flaws in Adobe Flash Player and Microsoft Windows. A successf...
The campaign targets government and private companies in the Middle East. The threat actors behind the operation use malicious Mic...
The McAfee Advanced Threat Research team and McAfee Labs Malware Operations Group have discovered a new global campaign targeting ...
A remote code execution vulnerability was discovered in Adobe Flash Player for Windows, macOS, Linux and Chrome OS. The flaw is du...
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Ed...