50K WordPress Sites Exposed to Remote Code Execution Attacks by Critical Bug in Back Up Plugin
A critical severity vulnerability has been identified in a WordPress plugin with more than 90,000 installs and this could be exploited by attackers to gain remote code execution to fully compromise vulnerable websites.
Read More
Cyber Threats to Watch Out for in 2024
In 2023, we have seen the AI boom and how organisations are quickly integrating this new technology into their existing processes.
Read More
Microsoft: Outlook email sending issues for users with lots of folders
A new issue affecting Outlook for Microsoft 365 users has been identified and this is causing email-sending problems for those with too many nested folders.
Read More
Malware or malicious software, is any program or file that is intentionally harmful to a computer, network or server.
Analyze suspicious files, domains, IPs and URLs to detect malware and other breaches.
Read More
MAUSHIELD Membership Programme
MAUSHIELD Membership Program is free and open to organisations in the public and private sectors, including critical sectors and academia. Register to become a member of MAUSHIELD
Register Now
AutoSpill attack steals credentials from Android password managers
Security researchers developed a new attack, named as “AutoSpill”, to steal account credentials on Android during the autofill operation.
Read More

MAUSHIELD is the national platform for sharing cyber threat information and intelligence that can help organisations to improve their cybersecurity posture, minimize risks and prevent cyber-attacks.

MAUSHIELD is managed by the Computer Emergency Response Team of Mauritius, set-up under the section 38 of the Cybersecurity and Cybercrime Act 2021.

Real Time

Cyber Attacks

Improve Your

Cyber Security Posture

CERT-MU can help to improve your organisation’s cyber security posture. To find out on how we can protect your organisation or provide advice or guidance, speak to one of our experts.

Cyber Health Check

A cyber health check is essential in establishing a solid foundation on which to build your security infrastructure.  A cyber health check will help you identify your weakest security areas and recommend appropriate measures to mitigate your risks.

How well protected is your ICT Infrastructure from cyber threats?

Subscribe to Newsletter

Advice and

Guidance by Topic

Malware

Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server

Ransomware

Ransomware is a malware designed to deny a user or organization access to files on their computer

Phishing

Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message

Website defacement

Web defacement is an attack in which malicious parties penetrate a website and replace content on the site

Denial of Service

A denial-of-service (DoS) attack occurs when legitimate users are unable to access information systems, devices, or other network resources

Vulnerabilities

A vulnerability is a weakness in an IT system that can be exploited by an attacker to deliver a successful attack

SQL Injection

SQL Injection (SQL) is a type of an injection attack that makes it possible to execute malicious SQL statements

Social Engineering

Social engineering is the term used for a broad range of malicious activities accomplished through human interactions

Skip to content