Cybersecurity Threats

The CIS® and MS-ISAC® cybersecurity professionals analyze risks and alert members to current online security threats.

Timely updates when you need to take action

Subscribe to Advisories
Low
Guarded
Elevated
High
Severe

Explanation of the Current Alert Level of GUARDED

The alert level is the overall current threat level.

On December 18, the Cyber Threat Alert Level was evaluated and is remaining at Blue (Guarded) due to a vulnerability affecting multiple Cleo products. On December 12, the MS-ISAC released an advisory for a vulnerability in Cleo products that could allow for remote code execution. Organizations and users are advised to update and apply all appropriate vendor security patches to vulnerable systems and to continue to update their antivirus signatures daily. Another line of defense includes user awareness training regarding the threats posed by attachments and hypertext links contained in emails especially from un-trusted sources.

Read more about our approach

Latest Advisory

A Vulnerability in Apache Struts2 Could Allow for Remote Code Execution
23 Dec 2024
A vulnerability has been discovered in Apache Struts2, which could allow for remote code execution. Apache Struts2 is an open-source web applicat...
Read the details

 

Our MS-ISAC Advisories

Advisories Released (Last 12 Months)

MS-ISAC Advisories - Advisories Released
Monthly Advisories for September 2024

In Q3 2024, the Top 10 Malware observed via the MS-ISAC’s monitoring services changed moderately from the previous quarter. The downloader, SocGholish, continued to lead as the top malware, making up 42% of the list. Following SocGholish were the downloaders LandUpdate808 and ClearFake. This quarter marked the first time the MS-ISAC observed either of these downloaders in its quarterly Top 10 Malware list.

Top Malware Q3 2024
  1. SocGholish
  2. LandUpdate808
  3. ClearFake
  4. ZPHP
  5. Agent Tesla
  6. CoinMiner
  7. Arechclient2
  8. Mirai
  9. NanoCore
  10. Lumma Stealer
Take Control of Your Organization's Security
Security Operations Center

The information on this page is maintained by our Security Operations Center, which is part of MS-ISAC and EI-ISAC.