CIS Logo
tagline: Confidence in the Connected World


Multiple vulnerabilities have been discovered in Adobe Photoshop, ColdFusion, and Bridge that could allow for arbitrary code execution.



The  coronavirus epidemic is prompting companies to allow their employees to work from home or telecommute. Home IT devices are still subject to threats.


Multiple vulnerabilities have been discovered in Adobe Acrobat and Adobe Reader, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in SAP products, the most severe of which could allow an unauthenticated, remote attacker to execute code on the affected systems.



A vulnerability has been discovered in Microsoft Windows SMB Server that could allow for remote code execution.



Learn about the risk and rewards of social media for organizations and discover the importance of a social media security policy.


Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.



A vulnerability in ManageEngine Desktop Central could allow for remote code execution.



Multiple vulnerabilities have been discovered in Cisco Webex Network Recording Player and Cisco Webex Player which could allow an unauthenticated, remote attacker to execute arbitrary code on the system of a targeted user.



Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for remote code execution.



Learn how macro instructions used for automation can be leveraged by cybercriminals – and what to do about it.


Multiple vulnerabilities have been discovered in Red Hat products, the most severe of which could allow for reading of arbitrary files on the affected system.



A vulnerability has been discovered in the WordPress Duplicator Plugin that could allow for Arbitrary File Downloads.



In January 2020, the Top 10 Malware composition was very consistent with December 2019 with only a few new additions to the list.


1 2 3 4 74