large-logo-mcafee-dark

Threat Landscape Dashboard

Assessing today's threats and the relationships between them

icon-exploit-kit

Exploit Kits

Top toolkits used to exploit system vulnerabilities

icon-campaigns

Campaigns

Top targeted attacks

icon-ransomware

Ransomware

Top malicious ransomware software

icon-vulnerbility

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

Top 10 Threats

icon-ransomware

The ransomware uses AES and RSA encryption and demands between 15 and 50 Bitcoin for the decryption key. The malicious software ki...

icon-ransomware

The ransomware uses RSA-2048 and ChaCha20 encryption and requires the victim to contact the threat actor by email for the decrypti...

icon-ransomware

The ransomware drops a ransom note labeled "NEMTY-random characters-DECRYPT.txt" and requires the victim to open the thr...

icon-campaigns

The GALLIUM threat group targeted telecommunication providers to steal sensitive information. The actor focused on vulnerabilities...

icon-campaigns

The OilRig threat group, also known as APT34, is suspected to be behind a destructive attack against the energy and industrial sec...

icon-campaigns

The TA2101 threat group targeted a range of sectors in Germany, Italy, and the United States with spear-phishing emails that conta...

icon-exploit-kit

The exploit kit was discovered in late 2019 and targets vulnerabilities in Adobe Flash Player and the VBScript engine in Microsoft...

icon-vulnerbility

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, ak...

icon-vulnerbility

An information disclosure vulnerability exists when the Windows Remote Desktop Protocol (RDP) fails to properly handle objects in ...

icon-vulnerbility

A heap overflow vulnerability has been discovered in Adobe Acrobat and Reader. The flaw affects the applications installed on Micr...