CIS Logo
tagline: Confidence in the Connected World


Multiple vulnerabilities have been discovered in Moxa PT-7528 and PT-7828 Series Ethernet Switches, the most severe of which could allow for arbitrary code execution.



A vulnerability has been discovered in OpenSMTPD which would allow for remote code execution and local privilege escalation.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Learn what server message block (SMB) is, how it can be leveraged by cybercriminals, and what to do to deal with this issue.


Krebs attributes the bolstered collaboration between DHS and the NSA to “the 2016 election” and “interference by the Russians."


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Organizations need to understand what information on their networks is sensitive, and encrypt it, or don't have it on the network in the first place.


Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow for arbitrary code execution.



A vulnerability has been discovered in Cisco Smart Software Manager On-Prem which could allow for privileged read and write access to the affected system.



Learn how one cybersecurity consulting organization uses the security best practices of CIS SecureSuite to help clients defend against cyber threats.


Cyber threat actors (CTA) leverage interest during public health threats and high-profile events to conduct financial fraud and disseminate malware.


Before establishing a cyber hygiene protocol for your organization, it is important to do an inventory of all of the hardware, software, systems, and applications within the organization.


The EI-ISAC helps the Georgia Secretary of State’s Office and election officials in other states to collect, analyze and disseminate threat data.


The Multi-State Information Sharing and Analysis Center has created a list of End-of-Support (EOS) software dates from 1/01/2019 to 4/2020.


The Ransomware Prevention - Red Team vs Blue Team webinar will highlight the evolution of ransomware, common tactics used, and defensie strategies.


1 2 3 114