Kansas State University Department of Plant Pathology. 4024 Throckmorton 1712 Claflin Road Manhattan, KS 785-532-6176 785-532-5692 fax [email protected].
Top 10 cybersecurity threats
Learn about today’s top cybersecurity threats. These security threats have been identified and analyzed by our threat research team as the most impactful threats today. These include threats to network security, information security, and more. Click on a specific threat to learn about how to best protect your business.
Exploit Kits
Top toolkits used to exploit system vulnerabilities
Campaigns
Top targeted attacks
Ransomware
Top malicious ransomware software
Vulnerabilities
Top system weaknesses or flaws targeted by hackers
The ransomware appends a random extension to encrypted files and reports to double the price of the ...
The ransomware targets Nextcloud instances and appends '.NEXTCRY' to infected files. The m...
The Lazarus Group, also known as Hidden Cobra, has been in operation since at least 2009 and continu...
The DarkUniverse APT group targeted civilians and military organizations with spear-phishing emails ...
The Winnti threat group, also known as Axiom, targeted Microsoft SQL servers with a backdoor known a...
A Google Chrome zero-day vulnerability is being leveraged in targeted attacks. The flaw is classifie...
The exploit kit targets vulnerabilities in Adobe Flash Player and Microsoft Internet Explorer and an...
A use-after-free vulnerability has been discovered in Google Chrome. The flaw lies in the audio comp...
A remote code execution vulnerability exists in the way that the scripting engine handles objects in...
A user-after-free vulnerability has been discovered in Google Chrome. The defect lies in the PDFium ...