Cybersecurity Threats

The CIS® and MS-ISAC® cybersecurity professionals analyze risks and alert members to current online security threats.

Timely updates when you need to take action

Subscribe to Advisories

Explanation of the Current Alert Level of GUARDED

The alert level is the overall current threat level.

On September 20, the Cyber Threat Alert Level was evaluated and is remaining at Blue (Guarded) due to a vulnerability in Mozilla products. On September 13, the MS-ISAC released an advisory for a vulnerability in Mozilla products that could allow for arbitrary code execution. Organizations and users are advised to update and apply all appropriate vendor security patches to vulnerable systems and to continue to update their antivirus signatures daily. Another line of defense includes user awareness training regarding the threats posed by attachments and hypertext links contained in emails especially from un-trusted sources.

Read more about our approach

Latest Advisory

Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
22 Sep 2023
Multiple vulnerabilities have been discovered in Apple Products, the most severe of which could allow for arbitrary code execution. iOS is a mob...
Read the details


Our MS-ISAC Advisories

Advisories Released (Last 12 Months)

July 2023 monthly advisory bar graph 

Monthly Advisories for July 2023 are 18 count, 100%

In Q1 2023, the quarterly Top 10 Malware remained consistent with the previous quarter, with the majority of malware switching spots. SessionManager2 took the number one spot in Q1, comprising 55% of the Top 10 Malware incidents that the MS-ISAC detected. Additionally, Agent Tesla, CoinMiner, Gh0st, NanoCore, and SessionManager2 activity increased, while Ursnif and ZeuS activity decreased. Furthermore, we saw Laplas, Netshta, and ViperSoftX make their first appearance in the quarterly Top 10 Malware.

Top Malware Q1 2023
  1. SessionManager2
  2. CoinMiner
  3. Agent Tesla
  4. NanoCore
  5. Gh0st
  6. ZeuS
  7. Ursnif
  8. Laplas
  9. ViperSoftX
  10. Neshta
Take Control of Your Organization's Security
Security Operations Center

The information on this page is maintained by our Security Operations Center, which is part of MS-ISAC and EI-ISAC.