×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



A vulnerability has been discovered in HP FutureSmart that could allow for arbitrary code execution.



A vulnerability has been discovered in Microsoft Edge that could result in remote code execution.



A vulnerability has been discovered in Fortinet FortiWeb that could allow for arbitrary code execution.



A vulnerability has been discovered in multiple NETGEAR products, which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



A vulnerability has been discovered in Palo Alto PAN-OS that could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in iCloud for Windows Could Allow for Arbitrary Code Execution.



A vulnerability has been discovered in Palo Alto PAN-OS that could allow for arbitrary code execution.



These 10 cybersecurity tips will make your online shopping experience less risky, not to mention keep you in the spirit of the season and safer from those on the “naughty list”.


Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for arbitrary code execution in the context of the logged on user.



Deployed directly on an organization’s devices, CIS ESS can identify, detect, respond to, and remediate security incidents and alerts.


Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for arbitrary code execution.



The Multi-State Information Sharing and Analysis Center has created an End-of-Support (EOS) list of software where updates, patches, and other forms of support are no longer offered.


Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for remote code execution.



A vulnerability has been discovered in Cisco Adaptive Security Appliance and Firepower Threat Defense, which could allow attackers to bypass security mechanisms on the system.



1 2 3 38