CIS Logo
tagline: Confidence in the Connected World


Malware analysis examines the attributes or behavior of a particular piece of malware often for the purpose of identification, mitigation, or attribution.


User name and password are no longer sufficient. Using multi-factor authentication can help reduce the risk of online fraud and identify theft


The top 10 malware activity accounts for 64% of total malware notifications in April, a 7% increase from March. Malspam is the primary initiation vector.


A New York tenth-grader, named Cecilia* has been named the national winner of the CIS and MS-ISAC annual Kids Safe Online Poster Contest.


Multiple vulnerabilities in the Cisco WebEx Network Recording Player for Advanced Recording Format (ARF) files could allow an unauthenticated, remote attacker to execute arbitrary code on the system of a targeted user.



Multiple vulnerabilities have been discovered in watchOS, Safari, tvOS, iOS, Mojave, High Sierra and Sierra.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for code execution.



A vulnerability has been discovered in Adobe Flash which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Adobe Acrobat and Adobe Reader, the most severe of which could allow for arbitrary code execution.



The three parts commonly used to divide the web are the Surface Web, the Dark Web, and the Deep Web. 


Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for arbitrary code execution.



The Multi-State Information Sharing and Analysis Center has created a list of End-of-Support (EOS) software dates from 1/01/2019 to 4/2020.


Multiple vulnerabilities have been discovered in Cisco products, the most severe of which could allow for arbitrary code execution on the affected system.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



This security primer provides information on general DNS operations, IDS event types, requirements for investigation, recommendations, and references.


1 2 3 60