The Threat Landscape
Real-time cybersecurity data from 17 intelligence sources. CVE trends, ransomware tracking, malware analysis, botnet infrastructure, and global exposure data.
Latest CISA Security Advisories
Recent cybersecurity advisories from the U.S. Cybersecurity and Infrastructure Security Agency.
Known Exploited Vulnerabilities
Vulnerabilities confirmed to be actively exploited in the wild, tracked by the U.S. Cybersecurity and Infrastructure Security Agency.
KEV Additions by Year
Most Affected Vendors (KEV)
Recently Added
Active Threat Groups
Tracking 344 ransomware groups and their recent activity.
Recent Ransomware Activity
jacksoncountyin.com
View group profile →bayareaherbs.com
View group profile →st-annes.uk.com
View group profile →lifelongaccess.org
View group profile →funkychunky.com
View group profile →csb-battery.com
View group profile →ossistemes.com
View group profile →www.kurita.eu
View group profile →https://sibillacapital.com/
View group profile →lopezlawfl.com
View group profile →Arup Group
View group profile →AXCERA TRADING
View group profile →Tr***ic
View group profile →eclagestio360.com
View group profile →Houghton Mifflin Harcourt Company
View group profile →What's exposed right now
Real-time data from Shodan on internet-facing services and attack surface exposure worldwide.
Global SSH Exposure Rankings
Internet Scanning Intelligence
5 of 5 blacklisted IPs are also observed performing internet-wide scanning by GreyNoise.
Exploit Prediction Scores
CVEs with the highest probability of exploitation in the next 30 days, scored by FIRST.org's Exploit Prediction Scoring System.
APT Threat Explorer
Top Threat Origins
Showing all 503 threat groups
Source: ETDA Threat Group Cards · 503 groups indexed
Malware, abuse & detection intelligence
Unified threat feed from URLhaus, AbuseIPDB, VirusTotal, and Malware Bazaar — malware URLs, blacklisted IPs, and recent malware samples.
Malware Distribution
7% of tracked URLs are currently serving malware
Command & Control Infrastructure
Active botnet C2 servers tracked by Feodo Tracker. These servers control malware-infected systems worldwide.
Global Breach Landscape
Tracking 986 known data breaches affecting 17.6 billion accounts worldwide.
Most Recent Breaches Added
Recently published vulnerabilities
The latest CVE publications from CIRCL — newly disclosed vulnerabilities that may affect your infrastructure.
Kwetsbaarheden verholpen in LiteLLM door BerriAI
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 3.0.10
Red Hat Security Advisory: DevWorkspace Operator 0.40.1 release.
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 3.2.4
Red Hat Security Advisory: Kiali 2.22.2 for Red Hat OpenShift Service Mesh 3.3
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 3.1.7
Red Hat Security Advisory: Kiali 2.11.9 for Red Hat OpenShift Service Mesh 3.1
Red Hat Security Advisory: Red Hat build of OpenTelemetry 3.9.2 release
This is what we protect you against
The threat landscape evolves daily. Make sure your security does too.
Source Health Dashboard
Build: 2026-05-11T08:59:18.845Z | 15/17 sources active