large-logo-mcafee-dark

Threat Landscape Dashboard

Assessing today's threats and the relationships between them

icon-exploit-kit

Exploit Kits

Top toolkits used to exploit system vulnerabilities

icon-campaigns

Campaigns

Top targeted attacks

icon-ransomware

Ransomware

Top malicious ransomware software

icon-vulnerbility

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

Top 10 Threats

icon-ransomware

The ransomware uses AES encryption and adds various extensions to infected files. The malware was discovered in late 2017 with new...

icon-vulnerbility

A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in ...

icon-ransomware

The ProLock ransomware family appeared on the threat landscape in early 2020 and continues to evolve. The malware gains access to ...

icon-ransomware

Lockbit, a Ransomware-as-a Service, was identified in the first quarter of 2020 by a joint research effort from McAfee Labs and No...

icon-ransomware

Thanos ransomware was first discovered in February 2020 advertised on underground forums as a customizable piece of ransomware wit...

icon-campaigns

A threat actor targeted the IT, government, healthcare, financial, insurance, and media sectors across the United States with mult...

icon-campaigns

A threat actor targeted the United States government sector using commercial and open-source tools including Cobalt Strike, China ...

icon-campaigns

The Evilnum APT has added the RAT to its arsenal as part of a big change-up in its TTPs. The Evilnum group, which specializes in t...

icon-vulnerbility

A remote code execution vulnerability exists in Microsoft Exchange server due to improper validation of cmdlet arguments.An attack...

icon-vulnerbility

An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a d...