large-logo-mcafee-dark

Threat Landscape Dashboard

Assessing today's threats and the relationships between them

icon-exploit-kit

Exploit Kits

Exploit Kits

icon-campaigns

Campaigns

Campaigns

icon-ransomware

Ransomware

Ransomware

icon-vulnerbility

Vulnerabilities

Vulnerabilities

Top 10 Threats

icon-ransomware

The ransomware targets a range of sectors including healthcare, industrial control, and government. The malicious software seeks o...

icon-ransomware

The ransomware impersonates Globe ransomware and appends various extensions to encrypted files. The ransomware continues to evolve...

icon-ransomware

The ransomware uses AES encryption and adds a range of extensions including ".STOP", ".SUSPENDED", ".DATA...

icon-exploit-kit

The exploit kit is used to create malicious Microsoft Office documents in an attempt to exploit a range of Microsoft vulnerabiliti...

icon-exploit-kit

The exploit kit protects its own exploit code and C2 traffic with RSA encryption and takes advantage of flaws in Microsoft Interne...

icon-exploit-kit

The exploit kit was discovered in August 2018 and takes advantage of flaws in Adobe Flash Player and Microsoft Windows. A successf...

icon-campaigns

The campaign reuses a portion of code from the Seasalt implant (circa 2010) that is linked to the Chinese hacking group Comment Cr...

icon-campaigns

The campaign takes advantage of flaws in Microsoft Word in an attempt to drop a PowerShell backdoor labeled "POWERSHOWER&quot...

icon-vulnerbility

Texas Instruments BLE-STACK v2.2.1 for SimpleLink CC2640 and CC2650 devices allows remote attackers to execute arbitrary code via ...

icon-vulnerbility

A tampering vulnerability exists in PowerShell that could allow an attacker to execute unlogged code, aka "Microsoft PowerShe...