large-logo-mcafee-dark

Threat Landscape Dashboard

Assessing today's threats and the relationships between them

icon-exploit-kit

Exploit Kits

Top toolkits used to exploit system vulnerabilities

icon-campaigns

Campaigns

Top targeted attacks

icon-ransomware

Ransomware

Top malicious ransomware software

icon-vulnerbility

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

Top 10 Threats

icon-ransomware

The ransomware appends various extensions to infected files and is a variant of CrySiS. The malware has been in operation since 20...

icon-exploit-kit

The exploit kit was discovered in early 2019 and exploits a flaw in Adobe Flash Player to drop the GootKit Trojan. A Microsoft Win...

icon-ransomware

The ransomware appends a random extension to encrypted files and reports to double the price of the ransom if not paid on time. Th...

icon-campaigns

The campaign used a zero-day privilege escalation vulnerability in Microsoft Windows to carry out attacks against government insti...

icon-campaigns

The threat group behind the campaign is using the Ratsnif remote access trojan family to carry out attacks that perform a range of...

icon-campaigns

Multiple threat groups with ties to China have updated their arsenal to include the exploit for the Microsoft Equation Editor vuln...

icon-vulnerbility

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, ak...

icon-vulnerbility

A local elevation of privilege vulnerability exists in how splwow64.exe handles certain calls, aka 'Microsoft splwow64 Elevati...

icon-vulnerbility

Multiple critical memory safety bugs have been discovered in Mozilla Firefox 68 and Firefox ESR 60.8. Successful exploitation coul...

icon-vulnerbility

Multiple critical memory safety bugs have been discovered in Mozilla Firefox 68. Successful exploitation could lead to arbitrary c...