Threat Landscape Dashboard

Assessing today's threats and the relationships between them

Top 10 Threats

7.00

CVE-2017-0016

Microsoft Windows 10 Gold, 1511, and 1607; Windows 8.1; Windows RT 8.1; Windows Server 2012 R2, and Windows Server 2016 do not properly ...

7.00

CVE-2017-0210

An elevation of privilege vulnerability exists when Internet Explorer does not properly enforce cross-domain policies, which could allow ...

7.00

CVE-2017-0199

Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Win ...

10.00

Cerber - Ransomware

After encrypting the victims files, Cerber plays an audio file demanding a ransom to unlock the data. Targets include Office 365 users. ...

10.00

Locky - Ransomware

The ever evolving ransomware targets Windows users and does not infect computers using the Russian language. The malware encrypts files ...

10.00

CryptoWall - Ransomware

The ransomware focuses on victims who use the Windows operating system and encrypts files with RSA2048 encryption. The malware has been ...

10.00

RIG Exploit Kit

RIG is spread via suspicious advertisements that have been inserted into legitimate websites. The VIP version of the exploit kit, RIG-v, ...

10.00

Neutrino Exploit Kit

Neutrino and its predecessor Neutrino-v are popular exploit kits that surged in mid-2016. They are known for using compromised sites and ...

9.00

Operation Shamoon 2

The attack focused on targets in Saudi Arabia and the malware used was programmed to wipe the hard disk of the infected computer. Legiti ...

10.00

Operation Methbot

The ongoing fraud campaign is reported to be netting between US$3 to $5 million in fraudulent revenue per day. The operation was discove ...