MPOWER 2020 Logo

is going Digital on Nov 12.

Learn More

Threat Landscape Dashboard

Assessing today's threats and the relationships between them

Exploit Kits

Top toolkits used to exploit system vulnerabilities

Campaigns

Top targeted attacks

Ransomware

Top malicious ransomware software

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

Top 10 Threats

The ransomware uses AES encryption and adds various extensions to infected files. The malware was discovered in late 2017 with new...

The ransomware uses RSA-2048 and ChaCha20 encryption and requires the victim to contact the threat actor by email for the decrypti...

Egregor ransomware exfiltrates sensitive information before encrypting files and gives the victim three days to contact the threat...

A cyber espionage campaign aimed at organizations in Israel and around the world was discovered and attributed to the MuddyWater t...

The BAHAMUT threat group targeted multiple entities including government, citizens, and major industry companies with spear-phishi...

Multiple vulnerabilities classified under CVE-2019-5782, CVE-2020-0674, CVE-2016-0189¸ and CVE-2019-1458 are being used to redirec...

The Purple Fox exploit kit was discovered in mid-2019 and continues to evolve and add additional vulnerabilities to its arsenal. T...

A remote code execution vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement pack...

A remote code execution vulnerability exists in Microsoft Outlook software when the software fails to properly handle objects in m...

A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an appl...