Track ransomware campaigns, threat actors, IOCs, and CVEs exploited in ransomware attacks. 20 years of ransomware data accessible via a single REST API.
API Coverage
Developer-first
Single REST API key. JSON everywhere. Start for free with 30 req/min.
Get your free key →Latest Intelligence
Connected vehicles face escalating cyberattacks with 225% increase in CASE vehicle attacks (2018-2021) and vulnerabilities rising 321%. Multiple entry points via ECUs, keyless entry, OBD-II ports, and cloud services require integrated security strategies.
ProxyShell is a critical vulnerability chain (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207) enabling unauthenticated remote code execution on Microsoft Exchange servers. Since August 2021, ransomware groups including LockFile and Conti have actively exploited unpatched systems.
Insider data exfiltration incidents cost organizations $15M+ annually, with 9.4% of employees exfiltrating sensitive data over six-month periods. Remote work and employee attrition accelerate threats.
CVE-2021-44228 (Log4Shell), a CVSS 10.0 remote code execution flaw in Apache Log4j discovered December 9, 2021, achieved rapid widespread exploitation across 48%+ of corporate networks globally, spawning follow-up vulnerabilities CVE-2021-45046 and CVE-2021-45105, with continued exploitation by state-sponsored and criminal actors through 2022.
Explore other topics