Threat Landscape Dashboard

Assessing today's threats and the relationships between them

Top 10 Threats



The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before mishandles file upload, which allows remot ...



A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. ...


WannaCry - Ransomware

The ransomware uses exploits leaked by the Shadow Brokers and has infected a large number of computers including those in the government ...


Cerber - Ransomware

Cerber continues to evolve and is one of the most complex and sophisticated ransomware families to date. The ransomware is sold to distr ...


Locky - Ransomware

The ever evolving ransomware targets Windows users and does not infect computers using the Russian language. The malware encrypts files ...


Neutrino Exploit Kit

Neutrino and its predecessor Neutrino-v are popular exploit kits that surged in mid-2016. They are known for using compromised sites and ...


RIG Exploit Kit

RIG is spread via suspicious advertisements that have been inserted into legitimate websites. The VIP version of the exploit kit, RIG-v, ...


Nebula Exploit Kit

Nebula, a re-brand of the Sundown exploit kit, is available for rent for $2,000.00 a month on an underground forum and offers support to ...


Operation Wilted Tulip

The threat actors suspected of being behind the campaign are known to use a range of tools to carry out their cyber espionage attacks. T ...


Operation Dragonfly 2.0

The attack campaign has been active since at least 2015 and focuses on the energy sector. The group behind the attacks gain access to th ...

 Back to top Share This