large-logo-mcafee-dark

Threat Landscape Dashboard

Assessing today's threats and the relationships between them

icon-exploit-kit

Exploit Kits

Top toolkits used to exploit system vulnerabilities

icon-campaigns

Campaigns

Top targeted attacks

icon-ransomware

Ransomware

Top malicious ransomware software

icon-vulnerbility

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

Top 10 Threats

icon-ransomware

The ransomware uses AES encryption and adds various extensions to infected files. The malware was discovered in late 2017 with new...

icon-ransomware

Snatch ransomware has been identified using brute force tactics over RDP to gain access to Domain Administrator accounts. Once com...

icon-ransomware

A new ransomware family was discovered targeting MacIntosh users and is packaged inside legitimate software hosted on torrent site...

icon-campaigns

In mid-2020 companies in China were targeted with the GoldenSpy malware hidden inside of legitimate tax software. A few weeks late...

icon-campaigns

A skimming operation was discovered hiding malicious code within EXIF metadata on multiple websites to steal names, credit card da...

icon-campaigns

The Tetrade Campaign consisted of four banking trojan families which attacked users located across the world. The malware is attri...

icon-campaigns

The APT29 threat group, also known as Cozy Bear, targeted a range of sectors across Canada, Great Britain, and the United States. ...

icon-vulnerbility

A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests, aka...

icon-vulnerbility

SAP NetWeaver AS JAVA (LM Configuration Wizard), versions - 7.30, 7.31, 7.40, 7.50, does not perform an authentication check which...

icon-vulnerbility

In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management...