Threat Landscape Dashboard

Assessing today's threats and the relationships between them

Exploit Kits

Top toolkits used to exploit system vulnerabilities

Campaigns

Top targeted attacks

Ransomware

Top malicious ransomware software

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

Top 10 Threats

The ransomware targets a range of sectors including healthcare, industrial control, and government. The malicious software seeks o...

The ransomware uses AES encryption and adds various extensions to infected files. In November 2017 it was discovered the Necurs bo...

Neutrino and its predecessor Neutrino-v are popular exploit kits that surged in mid-2016. They are known for using compromised sit...

RIG is spread via suspicious advertisements that have been inserted into legitimate websites. The VIP version of the exploit kit, ...

The exploit kit is reported to have originated from China and focuses on users who visit compromised Korean websites. KaiXin resur...

The campaign performs a range of actions including performing DDOS attacks, the use of GHOST RAT for remote administration, crypto...

The campaign uses malicious Microsoft Word documents to take advantage of multiple flaws in Microsoft Office. The backdoor dropped...

The ransomware uses AES and RSA encryption and demands between 15 and 50 Bitcoin for the decryption key. The malicious software ki...

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, ...

Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when using results with no names...