Threat Landscape Dashboard

Assessing today's threats and the relationships between them

Top 10 Threats

10.00

CVE-2016-7200

The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service ...

10.00

CVE-2016-7201

The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service ...

7.00

CVE-2016-4190

Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows ...

10.00

Cerber - Ransomware

After encrypting the victims files, Cerber plays an audio file demanding a ransom to unlock the data. Targets include Office 365 users. ...

10.00

Locky - Ransomware

The ever evolving ransomware targets Windows users and does not infect computers using the Russian language. The malware encrypts files ...

7.00

Satan - Ransomware

The ransomware-as-a-service (RaaS) is hosted on the Dark Web and is free for attackers to use. The malware developer requires 30% in ret ...

10.00

RIG Exploit Kit

The RIG EK is spread via suspicious advertisements that have been inserted into legitimate websites. The VIP version of the EK, RIG-v, a ...

10.00

Neutrino Exploit Kit

The Neutrino EK, and its predecessor Neutrino-v, are popular exploit kits that surged in mid-2016. They are known for using compromised ...

7.55

Operation Shamoon 2

The attack focused on targets in Saudi Arabia and the malware used was programmed to wipe the hard disk of the infected computer. Legiti ...

7.10

Operation Methbot

The ongoing fraud campaign is reported to be netting between US$3 to $5 million in fraudulent revenue per day. The operation was discove ...