large-logo-mcafee-dark

Threat Landscape Dashboard

Assessing today's threats and the relationships between them

icon-exploit-kit

Exploit Kits

Top toolkits used to exploit system vulnerabilities

icon-campaigns

Campaigns

Top targeted attacks

icon-ransomware

Ransomware

Top malicious ransomware software

icon-vulnerbility

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

Top 10 Threats

icon-ransomware

The ransomware targets a range of sectors including healthcare, industrial control, and government. The malicious software seeks o...

icon-exploit-kit

The exploit kit is used to create malicious Microsoft Office documents in an attempt to exploit a range of Microsoft vulnerabiliti...

icon-ransomware

The ransomware appends random extensions to encrypted files and directs the victim to an html file for instructions on how to decr...

icon-exploit-kit

The exploit kit was discovered in August 2018 and takes advantage of flaws in Adobe Flash Player and Microsoft Windows. A successf...

icon-campaigns

The campaign reuses a portion of code from the Seasalt implant (circa 2010) that is linked to the Chinese hacking group Comment Cr...

icon-campaigns

The McAfee Advanced Threat Research team and McAfee Labs Malware Operations Group have discovered a new global campaign targeting ...

icon-vulnerbility

An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka "Windo...

icon-vulnerbility

A remote code execution vulnerability was discovered in Adobe Flash Player for Windows, macOS, Linux and Chrome OS. The flaw is du...

icon-vulnerbility

A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka "Internet Expl...

icon-vulnerbility

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, ...