Exploit Kits
Top toolkits used to exploit system vulnerabilities
Campaigns
Top targeted attacks
Ransomware
Top malicious ransomware software
Vulnerabilities
Top system weaknesses or flaws targeted by hackers
Top 10 Threats
The ransomware appends a random extension to encrypted files and reports to double the price of the ransom if not paid on time. Th...
The ransomware targets Nextcloud instances and appends ".NEXTCRY" to infected files. The malware uses both AES and RSA e...
The Lazarus Group, also known as Hidden Cobra, has been in operation since at least 2009 and continue to attack a range of entitie...
The DarkUniverse APT group targeted civilians and military organizations with spear-phishing emails with an attached malicious Mic...
The Winnti threat group, also known as Axiom, targeted Microsoft SQL servers with a backdoor known as "skip-2.0." The ma...
A Google Chrome zero-day vulnerability is being leveraged in targeted attacks. The flaw is classified under CVE-2019-13720 and aff...
The exploit kit targets vulnerabilities in Adobe Flash Player and Microsoft Internet Explorer and any threat actor can download an...
A use-after-free vulnerability has been discovered in Google Chrome. The flaw lies in the audio component. An active exploit has b...
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, ...
A user-after-free vulnerability has been discovered in Google Chrome. The defect lies in the PDFium component and affects versions...