The Threat Landscape
Real-time cybersecurity data from 17 intelligence sources. CVE trends, ransomware tracking, malware analysis, botnet infrastructure, and global exposure data.
Latest CISA Security Advisories
Recent cybersecurity advisories from the U.S. Cybersecurity and Infrastructure Security Agency.
Known Exploited Vulnerabilities
Vulnerabilities confirmed to be actively exploited in the wild, tracked by the U.S. Cybersecurity and Infrastructure Security Agency.
KEV Additions by Year
Most Affected Vendors (KEV)
Recently Added
Active Threat Groups
Tracking 343 ransomware groups and their recent activity.
Recent Ransomware Activity
CF Evans Construction
View group profile →Exco Technologies
View group profile →Imex International
View group profile →Shipping Services
View group profile →CAD-IT UK
View group profile →Advanced Laundry Systems
View group profile →CCD Interiors
View group profile →DL Cohen Construction
View group profile →Ruiz Barbarin Arquitectos Slp
View group profile →Fogel Capital Management
View group profile →Calidra
View group profile →CMC Expertise Comptable
View group profile →Acros Sport GmbH
View group profile →Ashtech Infotech
View group profile →PennEastern Architects
View group profile →What's exposed right now
Real-time data from Shodan on internet-facing services and attack surface exposure worldwide.
Global SSH Exposure Rankings
Exploit Prediction Scores
CVEs with the highest probability of exploitation in the next 30 days, scored by FIRST.org's Exploit Prediction Scoring System.
APT Threat Explorer
Top Threat Origins
Showing all 503 threat groups
Source: ETDA Threat Group Cards · 503 groups indexed
Malware, abuse & detection intelligence
Unified threat feed from URLhaus, AbuseIPDB, VirusTotal, and Malware Bazaar — malware URLs, blacklisted IPs, and recent malware samples.
Malware Distribution
7% of tracked URLs are currently serving malware
Command & Control Infrastructure
Active botnet C2 servers tracked by Feodo Tracker. These servers control malware-infected systems worldwide.
Global Breach Landscape
Tracking 986 known data breaches affecting 17.6 billion accounts worldwide.
Most Recent Breaches Added
Recently published vulnerabilities
The latest CVE publications from CIRCL — newly disclosed vulnerabilities that may affect your infrastructure.
Apache CloudStack: Proxmox Extension Allows Unauthorized Cross-Tenant Instance Access
Apache CloudStack: Unauthenticated Command Injection in Direct Download Templates
Apache CloudStack: Domain/account resources limits not honored
Apache CloudStack: MinIO policy remains intact on bucket deletion
Apache CloudStack: Any user can attach a volume in their VMs from backups they should not have access to
Apache CloudStack: Any user can create a new VM from backups they should not have access to
Apache CloudStack: Any user can list backups that they should not have access to
scsi: mpi3mr: Add NULL checks when resetting request and reply queues
This is what we protect you against
The threat landscape evolves daily. Make sure your security does too.
Source Health Dashboard
Build: 2026-05-09T11:28:21.062Z | 14/17 sources active