DETECTO/ThreatDossier
DashboardPricingThreatsRun Free ScanSign In
DETECTO/ThreatDossier

Security intelligence for MSPs, consultants, and businesses. Find breached credentials, compliance gaps, and exposed infrastructure before attackers do.

Product

  • Scan a Domain
  • Pricing
  • Dashboard
  • Sign In

Resources

  • Threat Intelligence
  • Ransomware Groups

Legal

  • Privacy Policy
  • Terms of Service

© 2026 DETECTO. All rights reserved.

Live Threat Intelligence
1,577

actively exploited vulnerabilities tracked by CISA right now

The CISA Known Exploited Vulnerabilities catalog currently tracks 1,577 actively exploited vulnerabilities, of which 317 are linked to known ransomware campaigns. The most targeted vendors are Microsoft (368 CVEs), Apple (93 CVEs), Cisco (89 CVEs).

Check Your Exposure

instant lookup

Is Your Stack at Risk?

Select vendors in your technology stack to see known exploited vulnerabilities.

Select vendors above to analyze your exposure to known exploited vulnerabilities.

Loading ransomware intelligence feeds...

Key Metrics

0Active KEVs
Ransomware Groups
0KEVs Linked to Ransomware
Disclosed Attacks

Threat Timeline — Last 24 Months

Attack Analysis

Loading attack frequency data...
Loading ransomware group data...
Industry data unavailable

Ransomware-Linked Exploitation

317Ransomware-Linked1,260Unknown

Most Targeted VendorsCISA KEV catalog(click to explore)

Weekly Threat Briefing

Get the top threats, new KEVs, and ransomware activity delivered to your inbox every Monday.

Browse all ransomware groups →

See How Your Domain Stacks Up

Run a free external security assessment — 15 modules, 200+ checks, results in under 2 minutes. No account required.

Scan Your Domain Free →