Explanation of the Current Alert Level of GUARDED
The alert level is the overall current threat level.
On July 10, the Cyber Threat Alert Level was evaluated and is remaining at Blue (Guarded) due to vulnerabilities in OpenSSH, Microsoft, Adobe, and Mozilla products. On July 9, the MS-ISAC released four advisories. The first advisory was for a vulnerability in OpenSSH that could allow for remote code execution. The second advisory was for multiple vulnerabilities in Microsoft products, the most severe of which could allow for remote code execution. The third advisory was for multiple vulnerabilities in Adobe products that could allow for arbitrary code execution. The fourth advisory was for multiple vulnerabilities in Mozilla products, the most severe of which could allow for arbitrary code execution. Organizations and users are advised to update and apply all appropriate vendor security patches to vulnerable systems and to continue to update their antivirus signatures daily. Another line of defense includes user awareness training regarding the threats posed by attachments and hypertext links contained in emails especially from un-trusted sources.
Latest Advisory
Our MS-ISAC Advisories
Advisories Released (Last 12 Months)
![Monthly Advisories for June 2024](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2024/07/june-2024.png?rev=cc86f9ec1d9e4c58b9e4dfc275e0fa4f&hash=416157DC9221F0AAD6976FC9F45A9A6F)
![Monthly Advisories for June 2024](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2024/07/monthly-advisories-june-2024.png?rev=d67da2f8804146a3aa07ca76e0045b71&hash=9B373A6362E50DFB6C05F546176632B2)
In Q1 2024, the Top 10 Malware observed at the Multi-State Information Sharing and Analysis Center® (MS-ISAC®) changed slightly from the previous quarter. The downloader SocGholish continues to lead as the Top Malware, making up 60% of the Top 10 Malware. ArechClient2, a .Net-based Remote Access Trojan (RAT), came in second, while CoinMiner, a malicious cryptocurreny miner, was the third most-prevalent malware in Q1 2024. Lumma Stealer, Jupyter, and Ratenjay all returned to the list in Q1. Please see below for more detailed malware descriptions and associated indicators of compromise. Windows operating systems.
Top Malware Q1 2024
- SocGholish
- Arechclient2
- CoinMiner
- NanoCore
- Agent Tesla
- Lumma Stealer
- Ratenjay
- Jupyter
- RogueRaticate
- Gh0st
Take Control of Your Organization's Security
![Security Operations Center](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2017/02/ms-isac-office.jpg?rev=55c2d2d2fe2c42779b9e24de440f010e&hash=0378ECF10FF4B6D48AD63E4CC0685CB1)
The information on this page is maintained by our Security Operations Center, which is part of MS-ISAC and EI-ISAC.