large-logo-mcafee-dark

Threat Landscape Dashboard

Assessing today's threats and the relationships between them

icon-exploit-kit

Exploit Kits

Top toolkits used to exploit system vulnerabilities

icon-campaigns

Campaigns

Top targeted attacks

icon-ransomware

Ransomware

Top malicious ransomware software

icon-vulnerbility

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

Top 10 Threats

icon-ransomware

The ransomware uses AES and RSA encryption and demands between 15 and 50 Bitcoin for the decryption key. The malicious software ki...

icon-ransomware

The ransomware uses RSA-2048 and ChaCha20 encryption and requires the victim to contact the threat actor by email for the decrypti...

icon-campaigns

Emissary Panda, also known as APT27 and Lucky Mouse, targeted entities with the ZxShell remote access trojan. The malicious softwa...

icon-campaigns

The APT34 threat group, also known as OilRig or Helix Kitten, are suspected to have targeted companies in the IT sector with malwa...

icon-campaigns

50 domains with ties to the Thallium threat group, also known as APT37 and Reaper, were taken offline in late 2019. The actor used...

icon-vulnerbility

A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificate...

icon-vulnerbility

This vulnerability has been modified since it was last analyzed by the NVD. It is awaiting reanalysis which may result in further ...

icon-vulnerbility

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: WLS Core Components). Supported versio...

icon-vulnerbility

A memory corruption vulnerability has been discovered in the Microsoft Internet Explorer Scripting Engine. Successful exploitation...

icon-vulnerbility

A zero-day vulnerability has been discovered in Mozilla Firefox. The critical flaw is due to a type confusion defect in the IonMon...