resources
CIL Security Advisory
Your trusted resource for the latest security updates, threat intelligence, and proactive solutions.
Review Bombing Attacks and Extortion
IntroductionMalicious actors use "review-bombing", a coordinated flood of fake, one-star reviews as an initial step for extortion. This high volume…
NOVEMBER 26TH, 2025
Synthetic Phishing: AI-Enabled Insider Impersonation
IntroductionThreat actors increasingly use artificial intelligence (AI) to impersonate trusted individuals such as executives, employees, or suppliers within organisations. These…
NOVEMBER 24TH, 2025
The Silent Security Threat: Data Hoarding
IntroductionThe greatest risk to your organization may be the sheer volume of data we hold, a practice known as Data…
NOVEMBER 19TH, 2025
Supply Chain Security: Preventing Software and Hardware Breaches
IntroductionA supply chain attack is an attack strategy that targets an organization through vulnerabilities in its supply chain. These vulnerable…
NOVEMBER 17TH, 2025
Cisco Firewall Zero-Day Vulnerability
IntroductionCisco has announced a new attack variant. This attack targets devices running Cisco Secure Firewall ASA and FTD Software that…
NOVEMBER 12TH, 2025
Understanding and Preventing Backdoor Execution
What Is Backdoor Execution?Backdoor execution occurs when cyber adversaries use hidden access points within a computer system or network to…
NOVEMBER 5TH, 2025
Pixel Stealing “Pixnapping”: A new exploit on Android
Introduction Android devices are vulnerable to a new attack that can covertly steal two-factor authentication codes, location timelines, and other…
OCTOBER 29TH, 2025
Understanding and Defending Against Adversary-in-the-Middle (AiTM) Phishing Attacks
What is an Adversary-in-the-Middle (AiTM) Phishing Attack? An AiTM phishing attack is a sophisticated form of phishing in which attackers…
OCTOBER 20TH, 2025
CAPTCHA Scams Exploiting Users to Steal Data
A CAPTCHA test is designed to determine if an online user is really a human and not a bot. CAPTCHA…
OCTOBER 15TH, 2025
Disclaimer: This publication is provided for informational purposes only and does not constitute professional advice or an endorsement of any specific products, services, or strategies. Readers are advised to use their discretion and seek professional advice before making any business or technology-related decisions based on the information provided.
Never miss a CIL Security Advisory
Stay informed with the latest security updates and insights from CIL.