resources

CIL Security Advisory

Your trusted resource for the latest security updates, threat intelligence, and proactive solutions.

Review Bombing Attacks and Extortion

Review Bombing Attacks and Extortion

IntroductionMalicious actors use "review-bombing", a coordinated flood of fake, one-star reviews as an initial step for extortion. This high volume…

NOVEMBER 26TH, 2025

Synthetic Phishing: AI-Enabled Insider Impersonation

Synthetic Phishing: AI-Enabled Insider Impersonation

IntroductionThreat actors increasingly use artificial intelligence (AI) to impersonate trusted individuals such as executives, employees, or suppliers within organisations. These…

NOVEMBER 24TH, 2025

The Silent Security Threat: Data Hoarding

The Silent Security Threat: Data Hoarding

IntroductionThe greatest risk to your organization may be the sheer volume of data we hold, a practice known as Data…

NOVEMBER 19TH, 2025

Supply Chain Security: Preventing Software and Hardware Breaches

Supply Chain Security: Preventing Software and Hardware Breaches

IntroductionA supply chain attack is an attack strategy that targets an organization through vulnerabilities in its supply chain. These vulnerable…

NOVEMBER 17TH, 2025

🛡️

Cisco Firewall Zero-Day Vulnerability

IntroductionCisco has announced a new attack variant. This attack targets devices running Cisco Secure Firewall ASA and FTD Software that…

NOVEMBER 12TH, 2025

Understanding and Preventing Backdoor Execution

Understanding and Preventing Backdoor Execution

What Is Backdoor Execution?Backdoor execution occurs when cyber adversaries use hidden access points within a computer system or network to…

NOVEMBER 5TH, 2025

Pixel Stealing “Pixnapping”: A new exploit on Android

Pixel Stealing “Pixnapping”: A new exploit on Android

Introduction Android devices are vulnerable to a new attack that can covertly steal two-factor authentication codes, location timelines, and other…

OCTOBER 29TH, 2025

Understanding and Defending Against Adversary-in-the-Middle (AiTM) Phishing Attacks

Understanding and Defending Against Adversary-in-the-Middle (AiTM) Phishing Attacks

What is an Adversary-in-the-Middle (AiTM) Phishing Attack? An AiTM phishing attack is a sophisticated form of phishing in which attackers…

OCTOBER 20TH, 2025

CAPTCHA Scams Exploiting Users to Steal Data

CAPTCHA Scams Exploiting Users to Steal Data

A CAPTCHA test is designed to determine if an online user is really a human and not a bot. CAPTCHA…

OCTOBER 15TH, 2025

Disclaimer: This publication is provided for informational purposes only and does not constitute professional advice or an endorsement of any specific products, services, or strategies. Readers are advised to use their discretion and seek professional advice before making any business or technology-related decisions based on the information provided.

Never miss a CIL Security Advisory

Stay informed with the latest security updates and insights from CIL.

Contact Us

Check your email. We have a message for you.

Start a project

Check your email. We have a message for you.

We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. You can manage your preferences or learn more in our Cookie Policy .