The ThreatCon is currently at Level 2: Elevated.

On February 10, 2015, Microsoft released its scheduled patch update for February 2015. This month's updates cover vulnerabilities in Microsoft Windows, Internet Explorer, and Microsoft Office. Nine security bulletins have been released to address these issues.

Customers are advised to install all applicable updates as soon as possible.

Microsoft Security Bulletin Summary for February 2015
https://technet.microsoft.com/en-us/library/security/ms15-feb

On February 4, 2015, a zero-day universal cross-site scripting (XSS) vulnerability (CVE-2015-0072) has been discovered in Microsoft Internet Explorer. The vulnerability affects Internet Explorer 11 on Windows 7 and Windows 8.1. With this vulnerability, a determined attacker can craft an email containing a link that leads to a malicious website. At this time, there are no indications that this vulnerability has been exploited in the wild.

Universal XSS vulnerability discovered in Microsoft Internet Explorer
http://www.symantec.com/connect/blogs/universal-xss-vulnerability-discovered-microsoft-internet-explorer

On February 2, 2015, Adobe released a security bulletin for a zero-day vulnerability in Adobe Flash Player. There are reports that the Adobe Flash Player Remote Code Execution Vulnerability (CVE-2015-0313) is actively being exploited in the wild via drive-by download attacks against systems running Internet Explorer and Firefox on Windows 8.1 and below.
On February 4, 2015, Adobe released security updates to fix the vulnerability.

Adobe Security Bulletin APSA15-02
https://helpx.adobe.com/security/products/flash-player/apsa15-02.html

Threatcon Level 1
ThreatCon Level 1
Low : Basic network posture
This condition applies when there is no discernible network incident activity and no malicious code activity with a moderate or severe risk rating. Under these conditions, only a routine security posture, designed to defeat normal network threats, is warranted. Automated systems and alerting mechanisms should be used.
Threatcon Level 1
ThreatCon Level 2
Medium : Increased alertness
This condition applies when knowledge or the expectation of attack activity is present, without specific events occurring or when malicious code reaches a moderate risk rating. Under this condition, a careful examination of vulnerable and exposed systems is appropriate, security applications should be updated with new signatures and/or rules as soon as they become available and careful monitoring of logs is recommended. Changes to the security infrastructure are not required.
Threatcon Level 1
ThreatCon Level 3
High : Known threat
This condition applies when an isolated threat to the computing infrastructure is currently underway or when malicious code reaches a severe risk rating. Under this condition, increased monitoring is necessary, security applications should be updated with new signatures and/or rules as soon as they become available and redeployment and reconfiguration of security systems is recommended. People should be able to maintain this posture for a few weeks at a time, as threats come and go.
Threatcon Level 1
ThreatCon Level 4
Extreme : Full alert
This condition applies when extreme global network incident activity is in progress. Implementation of measures in this Threat Condition for more than a short period probably will create hardship and affect the normal operations of network infrastructure.