resources

CIL Security Advisory

Your trusted resource for the latest security updates, threat intelligence, and proactive solutions.

Securing Your Payment Cards from NFC Attacks

Securing Your Payment Cards from NFC Attacks

IntroductionNear-Field Communication (NFC) is a technology that allows devices to communicate with each other when they're in proximity. NFC typically…

SEPTEMBER 16TH, 2024

MFA Fatigue Attacks

MFA Fatigue Attacks

IntroductionMFA fatigue attacks have recently surged as a dangerous social engineering tactic in the cybersecurity landscape. In these attacks, hackers…

SEPTEMBER 9TH, 2024

Secure Phone Content

Secure Phone Content

IntroductionMobile phones, indispensable for both personal and professional use, serve as the hub of our digital identities. As we increasingly…

SEPTEMBER 2ND, 2024

The Dangers of Malicious Email Attachment

The Dangers of Malicious Email Attachment

IntroductionOne click is all it takes to open the door to hackers. Malicious email attachments disguise themselves as innocent files…

AUGUST 19TH, 2024

Mobile Device Security in the Workplace

Mobile Device Security in the Workplace

IntroductionWith the widespread use of mobile devices for work, they have become prime targets for cyberattacks. High-profile breaches like in…

AUGUST 12TH, 2024

Strong Passwords: Your Defence Against Cyberattacks

Strong Passwords: Your Defence Against Cyberattacks

IntroductionPasswords are the cornerstone of digital security. Weak passwords pose a significant risk to both individuals and organisations. Cybercriminals frequently…

AUGUST 5TH, 2024

Security Questions: Still In Use but No Longer Acceptable?

Security Questions: Still In Use but No Longer Acceptable?

IntroductionSecurity questions are a common form of identity authentication commonly used when creating accounts or signing up for services online,…

JULY 15TH, 2024

Securing Private Messages on Your Social Media Accounts

Securing Private Messages on Your Social Media Accounts

IntroductionMessaging apps like WhatsApp, Twitter, and Messenger have become essential for communication. While these platforms offer convenience, they also present…

JULY 8TH, 2024

🛡️

AI-Powered Phishing Attacks

IntroductionAI-powered phishing attacks are becoming increasingly sophisticated, leveraging artificial intelligence to create highly personalized and convincing scams. These attacks exploit…

JULY 1ST, 2024

Disclaimer: This publication is provided for informational purposes only and does not constitute professional advice or an endorsement of any specific products, services, or strategies. Readers are advised to use their discretion and seek professional advice before making any business or technology-related decisions based on the information provided.

Never miss a CIL Security Advisory

Stay informed with the latest security updates and insights from CIL.

Contact Us

Check your email. We have a message for you.

Start a project

Check your email. We have a message for you.

We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. You can manage your preferences or learn more in our Cookie Policy .