large-logo-mcafee-dark

Threat Landscape Dashboard

Assessing today's threats and the relationships between them

icon-exploit-kit

Exploit Kits

Top toolkits used to exploit system vulnerabilities

icon-campaigns

Campaigns

Top targeted attacks

icon-ransomware

Ransomware

Top malicious ransomware software

icon-vulnerbility

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

Top 10 Threats

icon-ransomware

The ransomware appends various extensions to infected files and is a variant of CrySiS. The malware has been in operation since 20...

icon-ransomware

The ransomware appends random extensions to encrypted files and directs the victim to an html file for instructions on how to decr...

icon-campaigns

The McAfee Advanced Threat Research team and McAfee Labs Malware Operations Group have discovered a new global campaign targeting ...

icon-ransomware

The ransomware, also known as Worker32, uses both AES and RSA encryption and appends ".locked" to infected files. The ra...

icon-campaigns

The campaign's goal is to steal confidential information and targets a range of sectors including government and defense with ...

icon-campaigns

The attack campaign was carried out by the Whitefly espionage group and targeted a range of sectors including healthcare, media, t...

icon-exploit-kit

The exploit kit was discovered in early 2019 and exploits a flaw in Adobe Flash Player to drop the GootKit Trojan. A Microsoft Win...

icon-vulnerbility

In WinRAR versions prior to and including 5.61, There is path traversal vulnerability when crafting the filename field of the ACE ...

icon-vulnerbility

A remote code execution vulnerability has been discovered in Adobe ColdFusion 11, 2016, and 2018. The flaw is due to how file uplo...

icon-vulnerbility

A remote code execution vulnerability has been discovered in Google Chrome. The flaw is due to a Use-After-Free defect in the File...