large-logo-mcafee-dark

Threat Landscape Dashboard

Assessing today's threats and the relationships between them

icon-exploit-kit

Exploit Kits

Top toolkits used to exploit system vulnerabilities

icon-campaigns

Campaigns

Top targeted attacks

icon-ransomware

Ransomware

Top malicious ransomware software

icon-vulnerbility

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

Top 10 Threats

icon-ransomware

The ransomware, also known as GAmmAWare or DemonWare, demands up to $10,000.00 for the decryption key and gives the victim a time ...

icon-ransomware

The Avaddon Ransomware-as-a-Service (RaaS) program was discovered being advertised on underground forums in mid-2020. Affiliates a...

icon-campaigns

Australian governments and companies are being targeted by a sophisticated, possibly state-based, actor. The actor is making heavy...

icon-campaigns

The Qbot banking trojan has been in operation for more than a decade and continues to target entities worldwide. The malware has b...

icon-campaigns

A new threat group known as "Vendetta" was discovered in early 2020 targeting entities with spear-phishing emails to ste...

icon-campaigns

The InvisiMole threat group targeted the military, diplomacy, defense, and government sectors in Eastern Europe with an updated to...

icon-vulnerbility

Adobe Flash Player versions 32.0.0.371 and earlier, 32.0.0.371 and earlier, and 32.0.0.330 and earlier have an use after free vuln...

icon-vulnerbility

A remote code execution vulnerability exists when Microsoft Windows OLE fails to properly validate user input, aka 'Windows OL...

icon-vulnerbility

An elevation of privilege vulnerability exists in Windows Error Reporting (WER) when WER handles and executes files, aka 'Wind...

icon-vulnerbility

A privilege escalation vulnerability was discovered in Microsoft Windows. The flaw lies in the Windows Spatial Data Service and is...