large-logo-mcafee-dark

Threat Landscape Dashboard

Assessing today's threats and the relationships between them

icon-exploit-kit

Exploit Kits

Top toolkits used to exploit system vulnerabilities

icon-campaigns

Campaigns

Top targeted attacks

icon-ransomware

Ransomware

Top malicious ransomware software

icon-vulnerbility

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

Top 10 Threats

icon-ransomware

The ransomware uses AES encryption and adds one of more than 20 different extensions to infected files. The malicious software was...

icon-ransomware

The ransomware uses AES and RSA encryption and demands between 15 and 50 Bitcoin for the decryption key. The malicious software ki...

icon-ransomware

The ransomware appends a random extension to encrypted files and reports to double the price of the ransom if not paid on time. Th...

icon-vulnerbility

Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions...

icon-campaigns

The campaign targets a range of sectors with spear-phishing emails delivered from legitimate compromised accounts to drop a PowerS...

icon-campaigns

The group behind the operation target users in South Korea, China, and Taiwan with new tactics, techniques, and procedures includi...

icon-campaigns

The threat actor behind the operation launched a series of attacks in the last 18 months against multiple sectors including govern...

icon-vulnerbility

Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions...

icon-vulnerbility

A type confusion vulnerability has been discovered in Mozilla Firefox. The flaw lies in Array.pop and affects Firefox prior to 67....

icon-vulnerbility

A remote code execution vulnerability has been discovered in Mozilla Firefox. The flaw affects Firefox prior to 67.0.4 and Firefox...