CIS Logo
tagline: Confidence in the Connected World


Computer data is generally organized in data structures such as arrays, records, graphs, classes, or other configurations for efficiency.


Nemucod is a Trojan that downloads malicious files to an infected computer. According to Symantec, Nemucod was first discovered in December of 2015.


Multiple vulnerabilities have been discovered in the Siemen's SIMATIC WinCC and PCS software, which could allow for remote code execution.



Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow an attacker to execute arbitrary code, with failed exploit attempts potentially leading to denial of service conditions.



Pokémon GO has taken the mobile world by storm. Here are our tips for avoiding criminals in real life and online while playing the game.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could result in remote code execution.



A vulnerability has been discovered in a wide variety of Common Gateway Interface (CGI) based web products, which could allow for unauthorized redirection of traffic.



Multiple vulnerabilities have been discovered in Oracle products, which could allow an attacker to take complete control of an affected system.



Multiple vulnerabilities have been discovered in iOS, watchOS, tvOS, iTunes, OS X El Capitan, iCloud, AirPort base stations, and Safari, the most severe of which could allow for arbitrary code execution.



Use these sample metrics as a starting point to identify key information to help track progress of implementing the CIS Controls.


Multiple vulnerabilities in Adobe Acrobat and Adobe Reader could allow for remote code execution.



Multiple vulnerabilities have been discovered in Adobe Flash Player, the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Microsoft Office, the most severe of which could allow for remote code execution if a user opens a specially crafted Microsoft Office file.



A vulnerability exists in Microsoft Jscript and VBScript engines that could allow for remote code execution if a user visits a specially crafted website.



Multiple vulnerabilities have been discovered in Microsoft Edge that could allow for remote code execution.



1 109 110 111 112 113 130