Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


secure your organization
Secure Your Organization

secure specific platforms
Secure Specific Platforms

cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers




filter by topic
Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

Image of two men reading manual

Cybersecurity Threats

The CIS® and MS-ISAC® cybersecurity professionals analyze risks and alert members to current online security threats.


Our MS-ISAC Advisories

Advisories Released (Last 12 Months)

Monthly Advisory Count December 2021


Hot Topic

In Q2 2019 the MS-ISACobserved a 55% increase in the quantity of reported breaches when compared to the previous quarter and 53% decrease year to year. The significant decrease year to year is attributed to the absence of third-party breaches affecting multiple educational entities. The education sector experienced the most breaches, accounting for 71% of the breaches in Q2. The most prolific identified vector in Q2 was phishing, accounting for a combined 30% of reported breaches. The MS-ISAC did not identify any reports of W2 phishing scams affecting SLTT governments in Q2 2019, scams of this nature typically phase out in the second half the year.

Top Malware Last Month

  1. Shlayer
  2. CoinMiner
  3. NanoCore
  4. Agent Tesla
  5. Jupyter
  6. Hupigon
  7. ZeuS
  8. Blaknight
  9. CryptoWall
  10. ZLoader
Advisory icon

Latest advisory

Last Advisory 19 Jan 2022

Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution MS-ISAC ADVISORY NUMBER: 2022-010 DATE(S) ISSUED: 01/19/2022 OVERVIEW: Multiple…

Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution

Read the Details Arrow

Take Control of Your Organization's Security


The information on this page is maintained by our Security Operations Center, which is part of MS-ISAC and EI-ISAC.

Are you an employee at a U.S. state, territorial, local, or tribal government? Join MS-ISAC for more detailed analysis and information sharing.

Arrow Join MS-ISAC

The EI-ISAC is open to U.S. SLTT government organizations that support the elections officials of the United States, and associations thereof.

Arrow Join EI-ISAC

Interested in a particular platform?

Arrow See our CIS Benchmarks for Secure Platforms

Explanation of the Current Alert Level of GUARDED

The alert level is the overall current threat level.

Read more about our approach. Arrow

On January 26, the Cyber Threat Alert Level was evaluated and is remaining at Blue (Guarded) due to vulnerabilities in Google, Cisco, WordPress, F5Networks and Polkit products. On January 19, the MS-ISAC released and advisory for multiple vulnerabilities in Google Chrome, the most severe of which could allow for arbitrary code execution. On January 21, the MS-ISAC released two advisories. The first advisory was for multiple vulnerabilities in Cisco products, the most severe of which could allow for arbitrary code execution. The second advisory was for a backdoor in WordPress AccessPress plugins that could allow for a malicious actor to gain full access to a vulnerable website. On January 25, the MS-ISAC released an advisory for a vulnerability in F5Networks BIG-IP that could allow for denial of service. On January 26, the MS-ISAC released an advisory for a vulnerability in Polkit’s pkexec component that could allow for local escalation of privilege. Organizations and users are advised to update and apply all appropriate vendor security patches to vulnerable systems and to continue to update their antivirus signatures daily. Another line of defense includes user awareness training regarding the threats posed by attachments and hypertext links contained in emails especially from un-trusted sources.

Information Hub


Pencil White paper 27 Jan 2022

Pencil Blog post 24 Jan 2022

Pencil White paper 20 Jan 2022