Cyber Threat Advisory
Cyber Threat Updates
- When is One Vulnerability Scanner Not Enough?
Like antivirus software, vulnerability scans rely on a database of known weaknesses. That’s why websites like VirusTotal exist, to give cyber practitioners a chance to see whether a malware sample …
- Dropbox Discloses Breach of Digital Signature Service Affecting All Users
Cloud storage services provider Dropbox on Wednesday disclosed that Dropbox Sign (formerly HelloSign) was breached by unidentified threat actors, who accessed emails, usernames, and gen …
- New "Goldoon" Botnet Targets D-Link Routers With Decade-Old Flaw
A never-before-seen botnet called Goldoon has been observed targeting D-Link routers with a nearly decade-old critical security flaw with the goal of using the compromise …
- CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical flaw impacting GitLab to its Known Exploited Vulnerabilities (KEV) catalog, owing to active exploitation …
- New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
A new malware called Cuttlefish is targeting small office and home office (SOHO) routers with the goal of stealthily monitoring all traffic through the devices and gather …
MS-ISAC Updates
- CIS Benchmarks April 2024 Update
Here is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for April 2024.
- CIS Benchmarks Volunteer Spotlight: Pierluigi Falcone
Volunteers in the CIS Benchmarks Communities help those who seek a safer online experience. Learn how Pierluigi Falcone plays his part.
- Balancing Your Healthcare Cybersecurity & Compliance Efforts
Need a way to streamline your healthcare cybersecurity and compliance efforts? Here's how resources from CIS can help your organization.
- CIS Benchmarks March 2024 Update
Here is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for March 2024.
- The First Steps of Establishing Your Cloud Security Strategy
You've migrated to the cloud, which means it's time to focus on cloud security. Here are some first steps to begin enacting your cloud security strategy.
Subscribe to receive our monthly “Be Cyber Aware” report focused on regional cyber topics related to the Coastal Cyber District which includes Bryan, Bulloch, Camden, Chatham, Effingham, Glynn, Jenkins, Liberty, Long, McIntosh and Screven counties:
Last updated: 1/21/2023