Cyber Threat Advisory
Cyber Threat Updates
- Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Cybersecurity breaches can be devastating for both individuals and businesses alike. While many people tend to focus on understanding how and why they were targeted by such breaches, there …
- Police Chiefs Call for Solutions to Access Encrypted Data in Serious Crime Cases
European Police Chiefs said that the complementary partnership between law enforcement agencies and the technology industry is at risk due to end-to-end encryption (E2EE). They called on the industry …
- German Authorities Issue Arrest Warrants for Three Suspected Chinese Spies
German authorities said they have issued arrest warrants against three citizens on suspicion of spying for China. The full names of the defendants were not disclosed by the Office of the Fed …
- U.S. Imposes Visa Restrictions on 13 Linked to Commercial Spyware Misuse
The U.S. Department of State on Monday said it's taking steps to impose visa restrictions on 13 individuals who are allegedly involved in the development and sale of comm …
- Russia's APT28 Exploited Windows Print Spooler Flaw to Deploy 'GooseEgg' Malware
The Russia-linked nation-state threat actor tracked as APT28 weaponized a security flaw in the Microsoft Windows Print Spooler component to deliver a previously unknown custom malware called …
MS-ISAC Updates
- CIS Benchmarks April 2024 Update
Here is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for April 2024.
- CIS Benchmarks Volunteer Spotlight: Pierluigi Falcone
Volunteers in the CIS Benchmarks Communities help those who seek a safer online experience. Learn how Pierluigi Falcone plays his part.
- Balancing Your Healthcare Cybersecurity & Compliance Efforts
Need a way to streamline your healthcare cybersecurity and compliance efforts? Here's how resources from CIS can help your organization.
- CIS Benchmarks March 2024 Update
Here is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for March 2024.
- The First Steps of Establishing Your Cloud Security Strategy
You've migrated to the cloud, which means it's time to focus on cloud security. Here are some first steps to begin enacting your cloud security strategy.
Subscribe to receive our monthly “Be Cyber Aware” report focused on regional cyber topics related to the Coastal Cyber District which includes Bryan, Bulloch, Camden, Chatham, Effingham, Glynn, Jenkins, Liberty, Long, McIntosh and Screven counties:
Last updated: 1/21/2023