large-logo-mcafee-dark

Threat Landscape Dashboard

Assessing today's threats and the relationships between them

icon-exploit-kit

Exploit Kits

Top toolkits used to exploit system vulnerabilities

icon-campaigns

Campaigns

Top targeted attacks

icon-ransomware

Ransomware

Top malicious ransomware software

icon-vulnerbility

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

Top 10 Threats

icon-ransomware

The ransomware appends a random extension to encrypted files and reports to double the price of the ransom if not paid on time. Th...

icon-ransomware

The ransomware targets Nextcloud instances and appends ".NEXTCRY" to infected files. The malware uses both AES and RSA e...

icon-campaigns

The Lazarus Group, also known as Hidden Cobra, has been in operation since at least 2009 and continue to attack a range of entitie...

icon-campaigns

The DarkUniverse APT group targeted civilians and military organizations with spear-phishing emails with an attached malicious Mic...

icon-campaigns

The Winnti threat group, also known as Axiom, targeted Microsoft SQL servers with a backdoor known as "skip-2.0." The ma...

icon-campaigns

A Google Chrome zero-day vulnerability is being leveraged in targeted attacks. The flaw is classified under CVE-2019-13720 and aff...

icon-exploit-kit

The exploit kit targets vulnerabilities in Adobe Flash Player and Microsoft Internet Explorer and any threat actor can download an...

icon-vulnerbility

A use-after-free vulnerability has been discovered in Google Chrome. The flaw lies in the audio component. An active exploit has b...

icon-vulnerbility

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, ...

icon-vulnerbility

A user-after-free vulnerability has been discovered in Google Chrome. The defect lies in the PDFium component and affects versions...