Threat Landscape Dashboard

Assessing today's threats and the relationships between them

Top 10 Threats

10.00

Locky - Ransomware

The ever evolving ransomware targets Windows users and does not infect computers using the Russian language. The malware encrypts files ...

10.00

BTCWare - Ransomware

The ransomware demands 0.5 bitcoin for the decryption key and uses AES encryption. The malicious software was first discovered in early ...

10.00

Cerber - Ransomware

Cerber continues to evolve and is one of the most complex and sophisticated ransomware families to date. The ransomware is sold to distr ...

10.00

Operation APT28 DDE

The campaign uses a malicious Word document that leverages the Microsoft Office Dynamic Data Exchange (DDE) technique to bypass network ...

10.00

Operation FALLCHILL

The campaign infects systems with the FALLCHILL malware and uses multiple proxies to obfuscate network traffic. The goal of the attacks ...

10.00

Neutrino Exploit Kit

Neutrino and its predecessor Neutrino-v are popular exploit kits that surged in mid-2016. They are known for using compromised sites and ...

10.00

RIG Exploit Kit

RIG is spread via suspicious advertisements that have been inserted into legitimate websites. The VIP version of the exploit kit, RIG-v, ...

10.00

Nebula Exploit Kit

Nebula, a re-brand of the Sundown exploit kit, is available for rent for $2,000.00 a month on an underground forum and offers support to ...

9.00

CVE-2017-11882

Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2 ...

7.00

CVE-2017-11873

ChakraCore and Microsoft Edge in Windows 10 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attac ...