large-logo-mcafee-dark

Threat Landscape Dashboard

Assessing today's threats and the relationships between them

icon-exploit-kit

Exploit Kits

Top toolkits used to exploit system vulnerabilities

icon-campaigns

Campaigns

Top targeted attacks

icon-ransomware

Ransomware

Top malicious ransomware software

icon-vulnerbility

Vulnerabilities

Top system weaknesses or flaws targeted by hackers

Top 10 Threats

icon-ransomware

The ransomware uses AES and RSA encryption and demands between 15 and 50 Bitcoin for the decryption key. The malicious software ki...

icon-ransomware

The ransomware appends a random extension to encrypted files and reports to double the price of the ransom if not paid on time. Th...

icon-ransomware

The ransomware drops a ransom note labeled "NEMTY-DECRYPT.txt" and requires the victim to open the threat actors .onion ...

icon-campaigns

The COBALT DICKENS threat group, also known as Silent Librarian, sent spear-phishing emails to universities in multiple countries ...

icon-campaigns

The Stealth Falcon threat group has been in operation since at least 2012 and target multiple sectors located in the Middle East. ...

icon-campaigns

On Monday, September 9, 2019 the US Department of Homeland Security (DHS) released a report on possible malicious activity and pre...

icon-vulnerbility

Exim before 4.92.2 allows remote attackers to execute arbitrary code as root via a trailing backslash.

icon-vulnerbility

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remo...

icon-vulnerbility

An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in...

icon-vulnerbility

An elevation of privilege vulnerability exists in the way that ws2ifsl.sys (Winsock) handles objects in memory, aka 'Windows E...