CIS Logo
tagline: Confidence in the Connected World


There are no reports of this vulnerability being exploited in the wild, MS-ISAC assess the risk to government and business entities of all sizes to be high.


Ransomware is a type of malware that blocks access to a system, device, or file until a ransom is paid. Here are some guidelines to prevent digital damage.


The process of replacing the DREs, which have been used in precincts covering 83 percent of Pennsylvania voters, will cost at least $125 million.


A vulnerability has been discovered in PHP, which could allow an attacker to execute arbitrary code.



A vulnerability has been discovered in vBulletin which could allow for remote code execution when a malicious POST request is sent to the vulnerable application.



The Fall 2019 issue of Cybersecurity Quarterly shares ways to protect against ransomware, the latest guide for implementing the CIS Controls and more.


A vulnerability has been discovered in LibreOffice, which could allow for arbitrary command execution.



Multiple vulnerabilities have been discovered in Xcode, tvOS, Safari, iOS, iPadOS, watchOS, Mojave, High Sierra and Sierra.



The CIS team attended Oracle OpenWorld 2019 in San Francisco where we were announced as one of only ten launch partners for Oracle Cloud Infrastructure!


Multiple vulnerabilities have been discovered in Adobe ColdFusion, the most severe of which could allow for arbitrary code execution.



Since 2001, CIS has grown to support a wide range of products and services. Learn what it’s like to be a Product Support Team Manager at CIS.


CIS Benchmarks Demo
October 1, 2019
Join our monthly demo and learn how the secure configuration guidelines of the CIS Benchmarks can help keep your organization safe & secure.


Multiple vulnerabilities have been discovered in Microsoft Internet Explorer and Microsoft Defender, the most severe of which could allow for code execution.



Join the MS-ISAC, EI-ISAC, CISA and National Cyber Security Alliance for a deeper dive into National Cybersecurity Awareness Month.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



1 2 3 4 105