large-logo-mcafee-dark

Threat Landscape Dashboard

Assessing today's threats and the relationships between them

icon-exploit-kit

Exploit Kits

Top toolkits used to exploit system vulnerabilities

icon-campaigns

Campaigns

Top targeted attacks

icon-ransomware

Ransomware

Top malicious ransomware software

icon-vulnerbility

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

Top 10 Threats

icon-ransomware

The ransomware will perform reconnaissance on the targeted network, exfiltrate sensitive information, and then notify the victim t...

icon-ransomware

The ransomware, also known as Netwalker, targets enterprise networks and encrypts all Microsoft Windows systems found. The malware...

icon-campaigns

The Fox Kitten Campaign targeted multiple sectors around the world including information technology, oil, gas, telecommunications,...

icon-campaigns

The United States Government released an updated report attributed to the HIDDEN COBRA threat actor, also known as Lazarus, APT38,...

icon-campaigns

The APT33 threat group, also known as Elfin, Refined Kitten, Magnallium, and Holmium, is suspected to be behind a new remote admin...

icon-campaigns

A cyberespionage campaign targeting the gambling sector in Asia was discovered using a range of tools to exfiltrate sensitive info...

icon-vulnerbility

An elevation of privilege vulnerability exists in the Windows Installer when MSI packages process symbolic links, aka 'Windows...

icon-vulnerbility

An information vulnerability exists when Windows Modules Installer Service improperly discloses file information, aka 'Windows...

icon-vulnerbility

Adobe Flash Player versions 32.0.0.321 and earlier, 32.0.0.314 and earlier, 32.0.0.321 and earlier, and 32.0.0.255 and earlier hav...

icon-vulnerbility

smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute ar...