Threat Landscape Dashboard

Assessing today's threats and the relationships between them

Top 10 Threats

10.00

Locky - Ransomware

The ever evolving ransomware targets Windows users and does not infect computers using the Russian language. The malware encrypts files ...

10.00

BTCWare - Ransomware

The ransomware demands 0.5 bitcoin for the decryption key and uses AES encryption. The malicious software was first discovered in early ...

10.00

Cerber - Ransomware

Cerber continues to evolve and is one of the most complex and sophisticated ransomware families to date. The ransomware is sold to distr ...

10.00

Neutrino Exploit Kit

Neutrino and its predecessor Neutrino-v are popular exploit kits that surged in mid-2016. They are known for using compromised sites and ...

10.00

RIG Exploit Kit

RIG is spread via suspicious advertisements that have been inserted into legitimate websites. The VIP version of the exploit kit, RIG-v, ...

10.00

Nebula Exploit Kit

Nebula, a re-brand of the Sundown exploit kit, is available for rent by the day, week, or month on underground forums and offers support ...

9.00

CVE-2017-11882

Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2 ...

10.00

Operation Dark Caracal

The campaign targets a wide range of sectors across the globe in an attempt to steal sensitive information. The operation uses trojanize ...

7.10

CVE-2018-0101

A vulnerability in the Secure Sockets Layer (SSL) VPN functionality of the Cisco Adaptive Security Appliance (ASA) Software could allow ...

7.67

Operation HaoBao

The Bitcoin-stealing phishing campaign targets Bitcoin users and global financial organizations with malicious documents that pretend to ...