x
Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu

Image of two men reading manual

Cybersecurity Threats

The CIS® and MS-ISAC® cybersecurity professionals analyze risks and alert members to current online security threats.

Low
Guarded
Elevated
High
Severe

Our MS-ISAC Advisories

Advisories Released (Last 12 Months)

MS-ISAC Advisories 2021

 
 

Hot Topic

   
In Q2 2019 the MS-ISACobserved a 55% increase in the quantity of reported breaches when compared to the previous quarter and 53% decrease year to year. The significant decrease year to year is attributed to the absence of third-party breaches affecting multiple educational entities. The education sector experienced the most breaches, accounting for 71% of the breaches in Q2. The most prolific identified vector in Q2 was phishing, accounting for a combined 30% of reported breaches. The MS-ISAC did not identify any reports of W2 phishing scams affecting SLTT governments in Q2 2019, scams of this nature typically phase out in the second half the year.

Top Malware Last Month

  1. Shlayer
  2. CoinMiner
  3. Mirai
  4. NanoCore
  5. Quasar
  6. ZeuS
  7. Gh0st
  8. BitCoin Miner
  9. Ursnif
  10. CryptoWall
Advisory icon

Latest advisory

Last Advisory 22 Sep 2021

Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution MS-ISAC ADVISORY NUMBER: 2021-118 DATE(S) ISSUED: 09/22/2021 OVERVIEW: Multiple…

Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution

Read the Details Arrow

Take Control of Your Organization's Security


ms-isac-office

The information on this page is maintained by our Security Operations Center, which is part of MS-ISAC and EI-ISAC.

Are you an employee at a U.S. state, territorial, local, or tribal government? Join MS-ISAC for more detailed analysis and information sharing.

Arrow Join MS-ISAC

The EI-ISAC is open to U.S. SLTT government organizations that support the elections officials of the United States, and associations thereof.

Arrow Join EI-ISAC

Interested in a particular platform?

Arrow See our CIS Benchmarks for Secure Platforms

Explanation of the Current Alert Level of GUARDED

The alert level is the overall current threat level.

Read more about our approach. Arrow

On September 22, the Cyber Threat Alert Level was evaluated and is remaining at Blue (Guarded) due to vulnerabilities in Siemens, Apple, VMware, and Google products. On September 15, the MS-ISAC released an advisory for multiple vulnerabilities in Siemens SIPROTEC 5, the most severe of which could allow for arbitrary code execution. On September 21, the MS-ISAC released an advisory for multiple vulnerabilities in Apple products, the most severe of which could allow for arbitrary code execution. On September 22, the MS-ISAC released two advisories. The first advisory was for multiple vulnerabilities in VMware vCenter Server, the most severe of which could allow for remote code execution. The second advisory was for multiple vulnerabilities in Google Chrome, the most severe of which could allow for arbitrary code execution. Organizations and users are advised to update and apply all appropriate vendor security patches to vulnerable systems and to continue to update their antivirus signatures daily. Another line of defense includes user awareness training regarding the threats posed by attachments and hypertext links contained in emails especially from un-trusted sources.

Information Hub


CONTROL: 1 --- ADVISORY CONTROL: 0
CONTROL: 2 --- ADVISORY CONTROL: 0
CONTROL: 3 --- ADVISORY CONTROL: 0
CONTROL: 4 --- ADVISORY CONTROL: 0