Threat Landscape Dashboard

Assessing today's threats and the relationships between them

Exploit Kits

Exploit Kits

Campaigns

Campaigns

Ransomware

Ransomware

Vulnerabilities

Vulnerabilities

Top 10 Threats

The ransomware targets a range of sectors including healthcare, industrial control, and government. The malicious software seeks o...

The ransomware demands 0.5 bitcoin for the decryption key and uses AES encryption. The malicious software was first discovered in ...

Cerber continues to evolve and is one of the most complex and sophisticated ransomware families to date. The ransomware is sold to...

Neutrino and its predecessor Neutrino-v are popular exploit kits that surged in mid-2016. They are known for using compromised sit...

RIG is spread via suspicious advertisements that have been inserted into legitimate websites. The VIP version of the exploit kit, ...

The campaign targets a range of sectors around the world in an attempt to steal sensitive information. The group behind the operat...

The exploit kit is used to create malicious Microsoft Office documents in an attempt to exploit a range of Microsoft vulnerabiliti...

The attack focuses on networking equipment from various vendors as well as network-attached storage (NAS) devices. The malware use...

A stack-based buffer overflow exist in Adobe Flash Player. Successful exploitation could lead to remote code execution. An exploit...

An Elevation of Privilege vulnerability exists when Cortana retrieves data from user input services without consideration for stat...