large-logo-mcafee-dark

Threat Landscape Dashboard

Assessing today's threats and the relationships between them

icon-exploit-kit

Exploit Kits

Top toolkits used to exploit system vulnerabilities

icon-campaigns

Campaigns

Top targeted attacks

icon-ransomware

Ransomware

Top malicious ransomware software

icon-vulnerbility

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

Top 10 Threats

icon-ransomware

The PwndLocker ransomware was discovered in late 2019 and in addition to encrypting files on infected systems the actor behind the...

icon-ransomware

A threat actor is pretending to promote legitimate software from WiseCleaner to distribute ransomware labeled as CoronaVirus. The ...

icon-ransomware

A new variant of the Paradise ransomware was discovered using weaponized Microsoft Office IQY files attached to spear-phishing ema...

icon-campaigns

The Molerats threat group targeted multiple sectors across six countries with spear-phishing emails containing malicious attachmen...

icon-campaigns

Threat actors are taking advantage of the current COVID-19 pandemic to infect unsuspecting victims with malware from multiple fami...

icon-campaigns

An unknown Advanced Persistent Threat targeted servers hosted on Amazon Web Services with a rootkit that evaded detection by using...

icon-vulnerbility

A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in ...

icon-vulnerbility

Type confusion in V8 in Google Chrome prior to 80.0.3987.122 allowed a remote attacker to potentially exploit heap corruption via ...

icon-vulnerbility

A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles cer...

icon-vulnerbility

When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats ...