Threat Landscape

Real-time data from CISA and NIST demonstrates why continuous information security is not optional — it is a necessity.

Global threat activity

Real-time data from multiple open threat databases shows where cyber attacks originate and how they target European countries.

Attack traffic (SANS)
Malware C2 (ThreatFox)
Blocklist (Blocklist.de)
Malware distribution (URLhaus)
Compromised (ET)
Known threats (CI Army)
European targets

Threat source summary

Aggregated statistics from the six threat databases visualised on the map.

Threat sources – geographic spread

Attack traffic (SANS)
646,097,504 indicators · 30 countries
Malware C2 (ThreatFox)
100 indicators · 25 countries
Blocklist (Blocklist.de)
90 indicators · 25 countries
Known threats (CI Army)
100 indicators · 23 countries
Compromised (ET)
100 indicators · 21 countries
Malware distribution (URLhaus)
100 indicators · 13 countries

Top 5 source countries

1United States
201,723,765
2Netherlands
57,621,439
3Bulgaria
46,390,735
4Germany
44,224,786
5Brazil
37,668,793

Total indicator count aggregated across all sources.

1,536

Actively exploited vulnerabilities

31

New in the last 30 days

1,296

New CVEs in the last 7 days

14

Critical (CVSS 9.0+)

25

High (CVSS 7.0–8.9)

Vendors with active remediation deadlines

Apple 3 active vulnerabilities
Roundcube 2 active vulnerabilities
Hikvision 1 active vulnerabilities
Rockwell 1 active vulnerabilities
Broadcom 1 active vulnerabilities

Ransomware share

20%
Ransomware-linked
Unknown link

312 / 1,536

Critical CVEs in the last 7 days

The five most severe new vulnerabilities with a CVSS score of 9.0 or higher.

9.3
CVE-2026-2844

28 Feb 2026

Missing Authentication for Critical Function vulnerability in Microchip TimePictra allows Configuration/Environment Manipulation.This issue affects TimePictra: from 11.0 through 11.3 SP2.

Critical
9.3
CVE-2026-3010

28 Feb 2026

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Microchip TimePictra allows Query System for Information.This issue affects TimePictra: ...

Critical
9.3
CVE-2026-2999

2 Mar 2026

IDExpert Windows Logon Agent developed by Changing has a Remote Code Execution vulnerability, allowing unauthenticated remote attackers to force the system to download arbitrary executable files fr...

Critical
9.3
CVE-2026-3000

2 Mar 2026

IDExpert Windows Logon Agent developed by Changing has a Remote Code Execution vulnerability, allowing unauthenticated remote attackers to force the system to download arbitrary DLL files from a re...

Critical
9.3
CVE-2026-3422

2 Mar 2026

U-Office Force developed by e-Excellence has a Insecure Deserialization vulnerability, allowing unauthenticated remote attackers to execute arbitrary code on the server by sending maliciously craft...

Critical

Latest exploited vulnerabilities

CVE-2017-7921 Unknown

Hikvision

Multiple Products

5 Mar 2026

CVE-2021-22681 Unknown

Rockwell

Multiple Products

5 Mar 2026

CVE-2023-43000 Unknown

Apple

Multiple Products

5 Mar 2026

CVE-2021-30952 Unknown

Apple

Multiple Products

5 Mar 2026

CVE-2023-41974 Unknown

Apple

iOS and iPadOS

5 Mar 2026

CVE-2026-22719 Unknown

Broadcom

VMware Aria Operations

3 Mar 2026

CVE-2026-21385 Unknown

Qualcomm

Multiple Chipsets

3 Mar 2026

CVE-2022-20775 Unknown

Cisco

SD-WAN

25 Feb 2026

CVE-2026-20127 Unknown

Cisco

Catalyst SD-WAN Controller and Manager

25 Feb 2026

CVE-2026-25108 Unknown

Soliton Systems K.K

FileZen

24 Feb 2026

Why it matters

The threat landscape changes daily

The data above comes directly from the US agencies CISA and NIST. It clearly shows that new threats and vulnerabilities are discovered continuously — and that attackers are actively exploiting them.

New vulnerabilities every day

Hundreds of new CVEs are published every week. Without systematic monitoring, you risk missing critical updates.

Ransomware-linked threats are growing

A significant share of actively exploited vulnerabilities have known links to ransomware campaigns.

Regulatory requirements are tightening

NIS2 and the Cybersecurity Act require organisations to work continuously on risk management and incident preparedness.

Source: CISA Known Exploited Vulnerabilities Source: NIST National Vulnerability Database Source: SANS ISC Source: ThreatFox (abuse.ch) Source: Blocklist.de Source: URLhaus (abuse.ch) Source: Emerging Threats Source: CI Army
Last updated: 7 Mar 2026

Ready to strengthen your cybersecurity?

Book a free meeting and we will discuss how we can help your organisation meet the new requirements.

Book a meeting