Cybersecurity Threats

The CIS® and MS-ISAC® cybersecurity professionals analyze risks and alert members to current online security threats.

Timely updates when you need to take action

Subscribe to Advisories
Low
Guarded
Elevated
High
Severe

Explanation of the Current Alert Level of GUARDED

The alert level is the overall current threat level.

On September 18, the Cyber Threat Alert Level was evaluated and is remaining at Blue (Guarded) due to vulnerabilities in Apple and Google products. On September 16, the MS-ISAC released an advisory for multiple vulnerabilities in Apple products, the most severe of which could allow for arbitrary code execution. On September 17, the MS-ISAC released an advisory for multiple vulnerabilities in Google products, the most severe of which could allow for arbitrary code execution. Organizations and users are advised to update and apply all appropriate vendor security patches to vulnerable systems and to continue to update their antivirus signatures daily. Another line of defense includes user awareness training regarding the threats posed by attachments and hypertext links contained in emails especially from un-trusted sources.

Read more about our approach

Latest Advisory

Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
18 Sep 2024
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exp...
Read the details

 

Our MS-ISAC Advisories

Advisories Released (Last 12 Months)

Monthly Advisories for July 2024
Monthly Advisories for July 2024

In Q1 2024, the Top 10 Malware observed at the Multi-State Information Sharing and Analysis Center® (MS-ISAC®) changed slightly from the previous quarter. The downloader SocGholish continues to lead as the Top Malware, making up 60% of the Top 10 Malware. ArechClient2, a .Net-based Remote Access Trojan (RAT), came in second, while CoinMiner, a malicious cryptocurreny miner, was the third most-prevalent malware in Q1 2024. Lumma Stealer, Jupyter, and Ratenjay all returned to the list in Q1. Please see below for more detailed malware descriptions and associated indicators of compromise. Windows operating systems.

Top Malware Q2 2024
  1. SocGholish
  2. Agent Tesla
  3. CoinMiner
  4. NanoCore
  5. ZPHP
  6. Mirai
  7. Magecart
  8. Arechclient2
  9. DarkGate
  10. Lumma Stealer
Take Control of Your Organization's Security
Security Operations Center

The information on this page is maintained by our Security Operations Center, which is part of MS-ISAC and EI-ISAC.