large-logo-mcafee-dark

Threat Landscape Dashboard

Assessing today's threats and the relationships between them

icon-exploit-kit

Exploit Kits

Top toolkits used to exploit system vulnerabilities

icon-campaigns

Campaigns

Top targeted attacks

icon-ransomware

Ransomware

Top malicious ransomware software

icon-vulnerbility

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

Top 10 Threats

icon-ransomware

The ransomware appeared on the threat landscape two years ago with new variants still being discovered in 2019. Recent variants of...

icon-ransomware

The ransomware impersonates Globe ransomware and appends various extensions to encrypted files. The ransomware continues to evolve...

icon-exploit-kit

The exploit kit is used to create malicious Microsoft Office documents in an attempt to exploit a range of Microsoft vulnerabiliti...

icon-exploit-kit

The exploit kit protects its own exploit code and C2 traffic with RSA encryption and takes advantage of flaws in Microsoft Interne...

icon-ransomware

The ransomware appends random extensions to encrypted files and directs the victim to an html file for instructions on how to decr...

icon-exploit-kit

The exploit kit was discovered in August 2018 and takes advantage of flaws in Adobe Flash Player and Microsoft Windows. A successf...

icon-campaigns

The campaign targets government and private companies in the Middle East. The threat actors behind the operation use malicious Mic...

icon-campaigns

The campaign infects users with malicious macro enabled Microsoft Excel documents to gain a foothold into the network. The C# payl...

icon-vulnerbility

A privilege escalation vulnerability has been discovered in Microsoft Exchange Server. The flaw lies in the notifications contract...

icon-vulnerbility

A privilege escalation vulnerability has been discovered in Microsoft Exchange Server. The flaw lies in the Exchange Web Services ...