MPOWER 2020 Logo

is going Digital on Oct 29, Nov 5 & Nov 12.

Learn More
large-logo-mcafee-dark

Threat Landscape Dashboard

Assessing today's threats and the relationships between them

icon-exploit-kit

Exploit Kits

Top toolkits used to exploit system vulnerabilities

icon-campaigns

Campaigns

Top targeted attacks

icon-ransomware

Ransomware

Top malicious ransomware software

icon-vulnerbility

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

Top 10 Threats

icon-ransomware

The ransomware uses AES encryption and adds various extensions to infected files. The malware was discovered in late 2017 with new...

icon-ransomware

The ransomware uses RSA-2048 and ChaCha20 encryption and requires the victim to contact the threat actor by email for the decrypti...

icon-ransomware

Egregor ransomware exfiltrates sensitive information before encrypting files and gives the victim three days to contact the threat...

icon-campaigns

A cyber espionage campaign aimed at organizations in Israel and around the world was discovered and attributed to the MuddyWater t...

icon-campaigns

The BAHAMUT threat group targeted multiple entities including government, citizens, and major industry companies with spear-phishi...

icon-campaigns

Multiple vulnerabilities classified under CVE-2019-5782, CVE-2020-0674, CVE-2016-0189¸ and CVE-2019-1458 are being used to redirec...

icon-exploit-kit

The Purple Fox exploit kit was discovered in mid-2019 and continues to evolve and add additional vulnerabilities to its arsenal. T...

icon-vulnerbility

A remote code execution vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement pack...

icon-vulnerbility

A remote code execution vulnerability exists in Microsoft Outlook software when the software fails to properly handle objects in m...

icon-vulnerbility

A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an appl...