large-logo-mcafee-dark

Threat Landscape Dashboard

Assessing today's threats and the relationships between them

icon-exploit-kit

Exploit Kits

Top toolkits used to exploit system vulnerabilities

icon-campaigns

Campaigns

Top targeted attacks

icon-ransomware

Ransomware

Top malicious ransomware software

icon-vulnerbility

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

Top 10 Threats

icon-ransomware

The ransomware targets a range of sectors including healthcare, industrial control, and government. The malicious software seeks o...

icon-exploit-kit

The exploit kit is used to create malicious Microsoft Office documents in an attempt to exploit a range of Microsoft vulnerabiliti...

icon-exploit-kit

The exploit kit protects its own exploit code and C2 traffic with RSA encryption and takes advantage of flaws in Microsoft Interne...

icon-ransomware

The ransomware uses AES and RSA encryption and demands between 15 and 50 Bitcoin for the decryption key. The malicious software ki...

icon-ransomware

The ransomware appends random extensions to encrypted files and directs the victim to an html file for instructions on how to decr...

icon-exploit-kit

The exploit kit was discovered in August 2018 and takes advantage of flaws in Adobe Flash Player and Microsoft Windows. A successf...

icon-campaigns

The campaign targets government and private companies in the Middle East. The threat actors behind the operation use malicious Mic...

icon-campaigns

The McAfee Advanced Threat Research team and McAfee Labs Malware Operations Group have discovered a new global campaign targeting ...

icon-vulnerbility

A remote code execution vulnerability was discovered in Adobe Flash Player for Windows, macOS, Linux and Chrome OS. The flaw is du...

icon-vulnerbility

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Ed...