New Prestige Ransomware Targets Organizations in Transport and Logistics Sectors
According to a Microsoft research and analysis, a new ransomware dubbed as “Prestige” is currently being used to target transportation and logistics organizations.
Read More
Cybersecurity Predictions 2023 – New Attack Trends to Watch Out
As the year 2022 reached its end and after a full year of data breaches, ransomware attacks and real-world cyber impacts stemming from Russia’s invasion of Ukraine, we want to know what would be in store for us in 2023.
Read More
Microsoft Releases Patch for Windows TLS Handshake Failure
A vulnerability has been identified in Microsoft Windows client and server platforms and this can affect some types of Secure Sockets Layer (SSL) and Transport Layer Security (TLS) connections.
Read More
Malware or malicious software, is any program or file that is intentionally harmful to a computer, network or server.
Analyze suspicious files, domains, IPs and URLs to detect malware and other breaches.
Read More
MAUSHIELD Membership Programme
MAUSHIELD Membership Program is free and open to organisations in the public and private sectors, including critical sectors and academia. Register to become a member of MAUSHIELD
Register Now
Active Campaign Targeting VOIP IPBX 3CX DesktopApp
Voice Over IP (VOIP) IPBX software development company 3CX has fallen victim to a supply chain cyberattack. Consequently, the recent versions of 3CX DesktopApp
Read More

MAUSHIELD is the national platform for sharing cyber threat information and intelligence that can help organisations to improve their cybersecurity posture, minimize risks and prevent cyber-attacks.

MAUSHIELD is managed by the Computer Emergency Response Team of Mauritius, set-up under the section 38 of the Cybersecurity and Cybercrime Act 2021.

Real Time

Cyber Attacks

Improve Your

Cyber Security Posture

CERT-MU can help to improve your organisation’s cyber security posture. To find out on how we can protect your organisation or provide advice or guidance, speak to one of our experts.

Cyber Health Check

A cyber health check is essential in establishing a solid foundation on which to build your security infrastructure.  A cyber health check will help you identify your weakest security areas and recommend appropriate measures to mitigate your risks.

How well protected is your ICT Infrastructure from cyber threats?

Subscribe to Newsletter

Advice and

Guidance by Topic


Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server


Ransomware is a malware designed to deny a user or organization access to files on their computer


Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message

Website defacement

Web defacement is an attack in which malicious parties penetrate a website and replace content on the site

Denial of Service

A denial-of-service (DoS) attack occurs when legitimate users are unable to access information systems, devices, or other network resources


A vulnerability is a weakness in an IT system that can be exploited by an attacker to deliver a successful attack

SQL Injection

SQL Injection (SQL) is a type of an injection attack that makes it possible to execute malicious SQL statements

Social Engineering

Social engineering is the term used for a broad range of malicious activities accomplished through human interactions

Skip to content