Threat Landscape
Real-time data from CISA and NIST demonstrates why continuous information security is not optional — it is a necessity.
Global threat activity
Real-time data from multiple open threat databases shows where cyber attacks originate and how they target European countries.
Threat source summary
Aggregated statistics from the six threat databases visualised on the map.
Threat sources – geographic spread
Top 5 source countries
Total indicator count aggregated across all sources.
1,536
Actively exploited vulnerabilities
31
New in the last 30 days
1,296
New CVEs in the last 7 days
14
Critical (CVSS 9.0+)
25
High (CVSS 7.0–8.9)
Vendors with active remediation deadlines
Ransomware share
312 / 1,536
Critical CVEs in the last 7 days
The five most severe new vulnerabilities with a CVSS score of 9.0 or higher.
28 Feb 2026
Missing Authentication for Critical Function vulnerability in Microchip TimePictra allows Configuration/Environment Manipulation.This issue affects TimePictra: from 11.0 through 11.3 SP2.
28 Feb 2026
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Microchip TimePictra allows Query System for Information.This issue affects TimePictra: ...
2 Mar 2026
IDExpert Windows Logon Agent developed by Changing has a Remote Code Execution vulnerability, allowing unauthenticated remote attackers to force the system to download arbitrary executable files fr...
2 Mar 2026
IDExpert Windows Logon Agent developed by Changing has a Remote Code Execution vulnerability, allowing unauthenticated remote attackers to force the system to download arbitrary DLL files from a re...
2 Mar 2026
U-Office Force developed by e-Excellence has a Insecure Deserialization vulnerability, allowing unauthenticated remote attackers to execute arbitrary code on the server by sending maliciously craft...
Latest exploited vulnerabilities
| CVE ID | Vendor | Product | Date added | Ransomware |
|---|---|---|---|---|
| CVE-2017-7921 | Hikvision | Multiple Products | 5 Mar 2026 | Unknown |
| CVE-2021-22681 | Rockwell | Multiple Products | 5 Mar 2026 | Unknown |
| CVE-2023-43000 | Apple | Multiple Products | 5 Mar 2026 | Unknown |
| CVE-2021-30952 | Apple | Multiple Products | 5 Mar 2026 | Unknown |
| CVE-2023-41974 | Apple | iOS and iPadOS | 5 Mar 2026 | Unknown |
| CVE-2026-22719 | Broadcom | VMware Aria Operations | 3 Mar 2026 | Unknown |
| CVE-2026-21385 | Qualcomm | Multiple Chipsets | 3 Mar 2026 | Unknown |
| CVE-2022-20775 | Cisco | SD-WAN | 25 Feb 2026 | Unknown |
| CVE-2026-20127 | Cisco | Catalyst SD-WAN Controller and Manager | 25 Feb 2026 | Unknown |
| CVE-2026-25108 | Soliton Systems K.K | FileZen | 24 Feb 2026 | Unknown |
Hikvision
Multiple Products
5 Mar 2026
Rockwell
Multiple Products
5 Mar 2026
Apple
Multiple Products
5 Mar 2026
Apple
Multiple Products
5 Mar 2026
Apple
iOS and iPadOS
5 Mar 2026
Broadcom
VMware Aria Operations
3 Mar 2026
Qualcomm
Multiple Chipsets
3 Mar 2026
Cisco
SD-WAN
25 Feb 2026
Cisco
Catalyst SD-WAN Controller and Manager
25 Feb 2026
Soliton Systems K.K
FileZen
24 Feb 2026
Why it matters
The threat landscape changes daily
The data above comes directly from the US agencies CISA and NIST. It clearly shows that new threats and vulnerabilities are discovered continuously — and that attackers are actively exploiting them.
New vulnerabilities every day
Hundreds of new CVEs are published every week. Without systematic monitoring, you risk missing critical updates.
Ransomware-linked threats are growing
A significant share of actively exploited vulnerabilities have known links to ransomware campaigns.
Regulatory requirements are tightening
NIS2 and the Cybersecurity Act require organisations to work continuously on risk management and incident preparedness.
Ready to strengthen your cybersecurity?
Book a free meeting and we will discuss how we can help your organisation meet the new requirements.
Book a meeting