Cybersecurity Threats

The CIS® and MS-ISAC® cybersecurity professionals analyze risks and alert members to current online security threats.

Timely updates when you need to take action

Subscribe to Advisories
Low
Guarded
Elevated
High
Severe

Explanation of the Current Alert Level of GUARDED

The alert level is the overall current threat level.

On November 20, the Cyber Threat Alert Level was evaluated and is remaining at Blue (Guarded) due to vulnerabilities in a Palo Alto product. On November 18, the MS-ISAC released an advisory for multiple vulnerabilities in Palo Alto PAN-OS, the most severe of which could allow for authentication bypass. Organizations and users are advised to update and apply all appropriate vendor security patches to vulnerable systems and to continue to update their antivirus signatures daily. Another line of defense includes user awareness training regarding the threats posed by attachments and hypertext links contained in emails especially from un-trusted sources.

Read more about our approach

Latest Advisory

Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution
27 Nov 2024
Multiple vulnerabilities have been discovered in Mozilla products, the most severe of which could allow for arbitrary code execution.Mozilla Fire...
Read the details

 

Our MS-ISAC Advisories

Advisories Released (Last 12 Months)

MS-ISAC Advisories - Advisories Released
Monthly Advisories for September 2024

In Q3 2024, the Top 10 Malware observed via the MS-ISAC’s monitoring services changed moderately from the previous quarter. The downloader, SocGholish, continued to lead as the top malware, making up 42% of the list. Following SocGholish were the downloaders LandUpdate808 and ClearFake. This quarter marked the first time the MS-ISAC observed either of these downloaders in its quarterly Top 10 Malware list.

Top Malware Q3 2024
  1. SocGholish
  2. LandUpdate808
  3. ClearFake
  4. ZPHP
  5. Agent Tesla
  6. CoinMiner
  7. Arechclient2
  8. Mirai
  9. NanoCore
  10. Lumma Stealer
Take Control of Your Organization's Security
Security Operations Center

The information on this page is maintained by our Security Operations Center, which is part of MS-ISAC and EI-ISAC.