large-logo-mcafee-dark

Threat Landscape Dashboard

Assessing today's threats and the relationships between them

icon-exploit-kit

Exploit Kits

Top toolkits used to exploit system vulnerabilities

icon-campaigns

Campaigns

Top targeted attacks

icon-ransomware

Ransomware

Top malicious ransomware software

icon-vulnerbility

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

Top 10 Threats

icon-ransomware

The ransomware appends various extensions to infected files and is a variant of CrySiS. The malware has been in operation since 20...

icon-ransomware

The ransomware appends random extensions to encrypted files and directs the victim to an html file for instructions on how to decr...

icon-campaigns

The McAfee Advanced Threat Research team and McAfee Labs Malware Operations Group have discovered a new global campaign targeting ...

icon-ransomware

The ransomware, also known as Worker32, uses both AES and RSA encryption and appends ".locked" to infected files. The ra...

icon-ransomware

The ransomware targets NAS storage devices and Samba servers and append either ".crypted" or ".NamPoHyu" to in...

icon-exploit-kit

The exploit kit was discovered in early 2019 and exploits a flaw in Adobe Flash Player to drop the GootKit Trojan. A Microsoft Win...

icon-campaigns

The supply chain attack targeted users who own ASUS computers with malware injected in the ASUS Live Update Utility. The threat ac...

icon-campaigns

The campaign attempts to infect its victims with either Ryuk and LockerGoga ransomware to extort funds. The operation uses a combi...

icon-vulnerbility

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, ak...

icon-vulnerbility

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, ak...