Threat Landscape Dashboard

Assessing today's threats and the relationships between them

Exploit Kits

Top toolkits used to exploit system vulnerabilities

Campaigns

Top targeted attacks

Ransomware

Top malicious ransomware software

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

Top 10 Threats

The ransomware threatens to delete files every hour unless the victim pays the ransom. Victims are infected after being tricked in...

The ransomware uses AES encryption and adds various extensions to infected files. In November 2017 it was discovered the Necurs bo...

The exploit kit is used to create malicious Microsoft Office documents in an attempt to exploit a range of Microsoft vulnerabiliti...

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, ak...

The ransomware appends random extensions to encrypted files and directs the victim to an html file for instructions on how to decr...

The exploit kit was discovered in August 2018 and takes advantage of flaws in Adobe Flash Player and Microsoft Windows. A successf...

Adobe Acrobat and Reader versions 2018.011.20058 and earlier, 2017.011.30099 and earlier, and 2015.006.30448 and earlier have an o...

The campaign reuses a portion of code from the Seasalt implant (circa 2010) that is linked to the Chinese hacking group Comment Cr...

The campaign mainly targets industrial control system workstations running SCADA software at energy companies in Ukraine and Polan...

A remote code execution vulnerability exists in the Microsoft JET Database Engine, aka "Microsoft JET Database Engine Remote ...