Cyber Threat Advisory
Cyber Threat Updates
- Blind Eagle Hacks Colombian Institutions Using NTLM Flaw, RATs and GitHub-Based Attacks
The threat actor known as Blind Eagle has been linked to a series of ongoing campaigns targeting Colombian institutions and government entities since November 2024. "The monitored campaigns targe …
- Ballista Botnet Exploits Unpatched TP-Link Vulnerability, Targets Over 6,000 Devices
Unpatched TP-Link Archer routers have become the target of a new botnet campaign dubbed Ballista, according to new findings from the Cato CTRL team. "The botnet exploits a remote code execution ( …
- Your Risk Scores Are Lying: Adversarial Exposure Validation Exposes Real Threats
In cybersecurity, confidence is a double-edged sword. Organizations often operate under a false sense of security, believing that patched vulnerabilities, up-to-date tools, polished dashboards, and gl …
- Steganography Explained: How XWorm Hides Inside Images
Inside the most innocent-looking image, a breathtaking landscape, or a funny meme, something dangerous could be hiding, waiting for its moment to strike. No strange file names. No antivirus warnings. …
- SideWinder APT Targets Maritime, Nuclear, and IT Sectors Across Asia, Middle East, and Africa
Maritime and logistics companies in South and Southeast Asia, the Middle East, and Africa have become the target of an advanced persistent threat (APT) group dubbed SideWinder. The attacks, observed b …
MS-ISAC Updates
- CIS Benchmarks March 2025 Update
Here is an overview of the CIS Benchmarks that the Center for Internet Security (CIS) updated or released for March 2025.
- CIS Benchmarks February 2025 Update
Here is an overview of the CIS Benchmarks that the Center for Internet Security (CIS) updated or released for February 2025.
- Top 10 Malware Q4 2024
In Q4 2024, the Top 10 Malware observed by the MS-ISAC® changed slightly from the previous quarter. Here are the malware that topped our list.
- CIS Benchmarks January 2025 Update
Here is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for January 2025.
- Top 5 Weakest Security Configurations and How to Fix Them
In H2 2024, the CIS CTI team found weak security configurations through passive scans of customers' external networks. Here's how to stay secure.
Subscribe to receive our monthly “Be Cyber Aware” report focused on regional cyber topics related to the Coastal Cyber District which includes Bryan, Bulloch, Camden, Chatham, Effingham, Glynn, Jenkins, Liberty, Long, McIntosh and Screven counties:
Last updated: 1/21/2023