large-logo-mcafee-dark

Threat Landscape Dashboard

Assessing today's threats and the relationships between them

icon-exploit-kit

Exploit Kits

Top toolkits used to exploit system vulnerabilities

icon-campaigns

Campaigns

Top targeted attacks

icon-ransomware

Ransomware

Top malicious ransomware software

icon-vulnerbility

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

Top 10 Threats

icon-ransomware

The ransomware will perform reconnaissance on the targeted network, exfiltrate sensitive information, and then notify the victim t...

icon-ransomware

The ransomware, also known as Netwalker, targets enterprise networks and encrypts all Microsoft Windows systems found. The malware...

icon-ransomware

The ransomware was discovered in mid-2020 and is a rebranded version of PwndLocker. The ransom for the decryption key depends on t...

icon-ransomware

The Ransomware-as-a-Service (RaaS) hit the threat landscape in September 2019 and was discovered to have breached a company and en...

icon-campaigns

Telecommunication companies in South Asia were targeted by the Greenbug espionage group with multiple backdoors, webshells, and st...

icon-campaigns

The Outlaw Hacking Group infected multiple regions around the world with a new version of malicious software known as ShellBot. Th...

icon-campaigns

A new campaign was discovered using a company’s Mobile Device Manager (MDM) server to distribute malware to mobile devices. The ma...

icon-campaigns

A campaign was discovered targeting the European region with spear-phishing emails using the coronavirus pandemic as a lure. After...

icon-vulnerbility

An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the f...

icon-vulnerbility

A security feature bypass vulnerability exists in Microsoft Windows when the Task Scheduler service fails to properly verify clien...