Cybersecurity Threats

The CIS® and MS-ISAC® cybersecurity professionals analyze risks and alert members to current online security threats.

Timely updates when you need to take action

Subscribe to Advisories
Low
Guarded
Elevated
High
Severe

Explanation of the Current Alert Level of GUARDED

The alert level is the overall current threat level.

On July 24, the Cyber Threat Alert Level was evaluated and is remaining at Blue (Guarded) due to vulnerabilities in Oracle, Cisco, and Google products. On July 18, the MS-ISAC released an advisory for multiple vulnerabilities in Oracle products, the most severe of which could allow for arbitrary code execution. Only July 22, the MS-ISAC released an advisory for a vulnerability in Cisco Secure Email Gateway that could allow for remote code execution. On July 23, the MS-ISAC released an advisory for multiple vulnerabilities in Google Chrome, the most severe of which could allow for arbitrary cod execution. Organizations and users are advised to update and apply all appropriate vendor security patches to vulnerable systems and to continue to update their antivirus signatures daily. Another line of defense includes user awareness training regarding the threats posed by attachments and hypertext links contained in emails especially from un-trusted sources.

Read more about our approach

Latest Advisory

Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
23 Jul 2024
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exp...
Read the details

 

Our MS-ISAC Advisories

Advisories Released (Last 12 Months)

Monthly Advisories for June 2024
Monthly Advisories for June 2024

In Q1 2024, the Top 10 Malware observed at the Multi-State Information Sharing and Analysis Center® (MS-ISAC®) changed slightly from the previous quarter. The downloader SocGholish continues to lead as the Top Malware, making up 60% of the Top 10 Malware. ArechClient2, a .Net-based Remote Access Trojan (RAT), came in second, while CoinMiner, a malicious cryptocurreny miner, was the third most-prevalent malware in Q1 2024. Lumma Stealer, Jupyter, and Ratenjay all returned to the list in Q1. Please see below for more detailed malware descriptions and associated indicators of compromise. Windows operating systems.

Top Malware Q1 2024
  1. SocGholish
  2. Arechclient2
  3. CoinMiner
  4. NanoCore
  5. Agent Tesla
  6. Lumma Stealer
  7. Ratenjay
  8. Jupyter
  9. RogueRaticate
  10. Gh0st
Take Control of Your Organization's Security
Security Operations Center

The information on this page is maintained by our Security Operations Center, which is part of MS-ISAC and EI-ISAC.