Know them. Find them. Stop them.

Discover the adversaries targeting your industry.

1 - 250
251 - 2,500
2,501 - 5,000
Over 5,000
Popular Searches
All Countries
Adversaries Map

Your Personalized Threat Landscape

Today's threat actors are smarter, more sophisticated, and more well resourced than they have ever been. Only by understanding them can you remain one step ahead of today's increasingly relentless adversaries.

Adversary count avatar

Adversaries potentially targeting you

      Global Threat Landscape

      !

      View your global threat landscape below organized by eCrime, hacktivism, and nation-states based on origin country. The map will show adversaries active within the past 90 days.

      Adversaries targeting you:

      Featured Adversaries

      CrowdStrike 2025 Global Threat Report

      Get the latest intrusion insights from the
      pioneer of adversary intelligence.

      eCrime Index

      The eCrime ecosystem is an active and diffuse economy of financially motivated entities who engage in myriad criminal activities in order to generate revenue. With the eCrime Index (ECX), CrowdStrike’s Intelligence team maintains a composite score to track changes to this ecosystem, including changes in eCrime activity, risk, and related costs.

      46.76

      1.87%

      Adversaries

      150%

      Increase in China-nexus activity across all sectors

      Attacks

      442%

      Growth in vishing operations between the first and second half of 2024

      Exploitation

      51seconds

      Was the fastest recorded eCrime breakout time in 2024

      Join the virtual briefing of the CrowdStrike 2025 Global Threat Report

      Hear from experts on the latest trends and key findings from the CrowdStrike 2025 Global Threat Report — and don’t miss out on the Adversary Universe podcast.

      Adam Meyers

      Adam Meyers

      Sr. VP of Counter Adversary Operations, CrowdStrike

      Cristian Rodriguez

      Cristian Rodriguez

      CTO of Americas, CrowdStrike

      Adversary Resources

      Adversary Universe

      Podcast

      Adversary Universe

      Learn more
      Counter Adversary Operations

      Blog Posts

      Counter Adversary Operations

      Learn more
      Threat Intelligence & Hunting

      Platform

      Threat Intelligence & Hunting

      Learn more

      The Most Anticipated Cybersecurity Report of the Year

      Download

      Falcon Pro

      Star rating 4.7/5 (204)
      Start now

      Recommended solution:

      CrowdStrike Falcon® Complete stops breaches on endpoints, workloads, and identities, with expert management, threat hunting, monitoring and remediation, and is backed by CrowdStrike’s Breach Prevention Warranty. *

      This includes:
      • Proactive platform management
      • 24/7 monitoring
      • Operated by experts
      • Investigates all detections: critical, high, med, low
      • 24/7 continuous threat hunting-based protection
      • Proactive surgical remediation
      • Backed by breach prevention warranty

      Falcon Complete

      Star rating 4.7/5 (204)
      Start now

      Recommended solution:

      CrowdStrike Falcon® Complete stops breaches on endpoints, workloads, and identities, with expert management, threat hunting, monitoring and remediation, and is backed by CrowdStrike’s Breach Prevention Warranty. *

      This includes:
      • Proactive platform management
      • 24/7 monitoring
      • Operated by experts
      • Investigates all detections: critical, high, med, low
      • 24/7 continuous threat hunting-based protection
      • Proactive surgical remediation
      • Backed by breach prevention warranty

      Falcon Complete

      Star rating 4.7/5 (204)
      Start now

      Recommended solution:

      CrowdStrike Falcon® Complete stops breaches on endpoints, workloads, and identities, with expert management, threat hunting, monitoring and remediation, and is backed by CrowdStrike’s Breach Prevention Warranty. *

      This includes:
      • Proactive platform management
      • 24/7 monitoring
      • Operated by experts
      • Investigates all detections: critical, high, med, low
      • 24/7 continuous threat hunting-based protection
      • Proactive surgical remediation
      • Backed by breach prevention warranty

      Falcon Complete

      Star rating 4.7/5 (204)
      Start now

      Recommended solution:

      This includes:
      • Proactive platform management
      • 24/7 monitoring
      • Operated by experts
      • Investigates all detections: critical, high, med, low
      • 24/7 continuous threat hunting-based protection
      • Proactive surgical remediation
      • Backed by breach prevention warranty

      * Breach Prevention Warranty: Not available in all locations, see FAQ here for additional information.