large-logo-mcafee-dark

Threat Landscape Dashboard

Assessing today's threats and the relationships between them

icon-exploit-kit

Exploit Kits

Top toolkits used to exploit system vulnerabilities

icon-campaigns

Campaigns

Top targeted attacks

icon-ransomware

Ransomware

Top malicious ransomware software

icon-vulnerbility

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

Top 10 Threats

icon-ransomware

The ransomware appends ".aes128ctr" to infected files and requires the victim to email the threat actor for the decrypti...

icon-ransomware

The ransomware appends a random extension to encrypted files and reports to double the price of the ransom if not paid on time. Th...

icon-campaigns

The threat group behind the campaign has been in operation since at least 2012 and initially focused on attacking the video game i...

icon-campaigns

A cyber espionage operation was discovered targeting the government, military, education, police, and foreign affairs sectors in t...

icon-campaigns

The Cloud Atlas threat group was discovered targeting multiple sectors with spear-phishing emails that contained malicious Microso...

icon-campaigns

The Silence Group has been in operation since at least 2016 and target financial institutions in multiple countries around the wor...

icon-exploit-kit

The Lord exploit kit was discovered in mid-2019 and leverages a use-after-free vulnerability in Adobe Flash Player classified unde...

icon-vulnerbility

A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenti...

icon-vulnerbility

A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenti...

icon-vulnerbility

The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not...