large-logo-mcafee-dark

Threat Landscape Dashboard

Assessing today's threats and the relationships between them

icon-exploit-kit

Exploit Kits

Top toolkits used to exploit system vulnerabilities

icon-campaigns

Campaigns

Top targeted attacks

icon-ransomware

Ransomware

Top malicious ransomware software

icon-vulnerbility

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

Top 10 Threats

icon-ransomware

The ransomware appeared on the threat landscape two years ago with new variants still being discovered in 2019. Recent variants of...

icon-ransomware

The ransomware impersonates Globe ransomware and appends various extensions to encrypted files. The ransomware continues to evolve...

icon-exploit-kit

The exploit kit is used to create malicious Microsoft Office documents in an attempt to exploit a range of Microsoft vulnerabiliti...

icon-ransomware

The ransomware uses AES and RSA encryption and demands between 15 and 50 Bitcoin for the decryption key. The malicious software ki...

icon-ransomware

The ransomware appends random extensions to encrypted files and directs the victim to an html file for instructions on how to decr...

icon-exploit-kit

The exploit kit was discovered in August 2018 and takes advantage of flaws in Adobe Flash Player and Microsoft Windows. A successf...

icon-campaigns

The campaign infects users with malicious macro enabled Microsoft Excel documents to gain a foothold into the network. The C# payl...

icon-campaigns

The campaign targets companies in Russia with Microsoft Office documents containing malicious macros. The operation requires the v...

icon-vulnerbility

A privilege escalation vulnerability has been discovered in Microsoft Exchange Server. The flaw lies in the notifications contract...

icon-vulnerbility

A privilege escalation vulnerability has been discovered in Microsoft Exchange Server. The flaw lies in the Exchange Web Services ...