Threat Landscape Dashboard

Assessing today's threats and the relationships between them

Exploit Kits

Top toolkits used to exploit system vulnerabilities

Campaigns

Top targeted attacks

Ransomware

Top malicious ransomware software

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

Top 10 Threats

The ransomware targets a range of sectors including healthcare, industrial control, and government. The malicious software seeks o...

The ransomware demands 0.5 bitcoin for the decryption key and uses AES encryption. The malicious software was first discovered in ...

Cerber continues to evolve and is one of the most complex and sophisticated ransomware families to date. The ransomware is sold to...

The attack campaign has been active since at least 2015 and focuses on the energy sector. The group behind the attacks gain access...

Neutrino and its predecessor Neutrino-v are popular exploit kits that surged in mid-2016. They are known for using compromised sit...

RIG is spread via suspicious advertisements that have been inserted into legitimate websites. The VIP version of the exploit kit, ...

The campaign targets a wide range of sectors across the globe in an attempt to steal sensitive information. The operation uses tro...

The exploit kit is used to create malicious Microsoft Office documents in an attempt to exploit a range of Microsoft vulnerabiliti...

A vulnerability in Java deserialization used by Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote at...

A vulnerability in Cisco Prime Collaboration Provisioning (PCP) Software could allow an unauthenticated, local attacker to log in ...