large-logo-mcafee-dark

Threat Landscape Dashboard

Assessing today's threats and the relationships between them

icon-exploit-kit

Exploit Kits

Top toolkits used to exploit system vulnerabilities

icon-campaigns

Campaigns

Top targeted attacks

icon-ransomware

Ransomware

Top malicious ransomware software

icon-vulnerbility

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

Top 10 Threats

icon-ransomware

The ransomware, also known as Djvu, uses AES encryption and adds one of more than 100 different extensions to infected files. The ...

icon-ransomware

The ransomware uses AES and RSA encryption and demands between 15 and 50 Bitcoin for the decryption key. The malicious software ki...

icon-ransomware

The ransomware appends a random extension to encrypted files and reports to double the price of the ransom if not paid on time. Th...

icon-campaigns

The Silent Librarian threat group, also known as TA407, Cobalt Dickens, and Mabna Institute, targeted entities in the academia sec...

icon-campaigns

The FIN7 threat group, also known as Anunak, used an in-memory-only tool known as BOOSTWRITE to drop the RDFSNIFFER payload and at...

icon-campaigns

The Casbaneiro banking trojan targets banks and cryptocurrency services with a focus on entities in Brazil and Mexico. The malware...

icon-campaigns

An attack campaign targeted the petroleum industry in the United States with the Adwind remote access trojan. The malicious softwa...

icon-vulnerbility

Exim 4.92 through 4.92.2 allows remote code execution, a different vulnerability than CVE-2019-15846. There is a heap-based buffer...

icon-vulnerbility

In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an unauthenticated rem...

icon-vulnerbility

Adobe Acrobat and Reader versions, 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30...