x
Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



This podcast episode lists the top 5 cybersecurity tips for the family including creating passwords, looking out for malware and more.


The Top 10 Malware variants comprise 63% of the total malware activity in July 2021. Shlayer is likely to continue its prevalence in the Top 10 Malware for the coming quarter.


Email hoaxes attempt to frighten recipients into paying an extortion demand, but can't actually carry out their threats. Here's how to recognize an email hoax.


The Senate’s bill would throw a cybersecurity funding lifeline to government agencies.


Multiple vulnerabilities have been discovered in Adobe Media Encoder, Adobe Bridge, Adobe Photoshop, Adobe XMP Toolkit SDK, and Adobe Captivate, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for arbitrary code execution in the context of the logged on user.



Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in NicheStack, the most severe of which could result in remote code execution.



The August 2021 MS-ISAC newsletter shares cybersecurity tips the entire family can use including how to keep children safe and secure home networks.


As students settled in for an uncertain pandemic year lastyearr, ransomware attacks against K-12 accounted for 57% of all incidents reported to the MS-ISAC.


The Senate is also negotiating passage of a $1 trillion infrastructure spending package, including $1 billion for a new cybersecurity grant program.


The Mirai botnet began by knocking rival Minecraft servers offline. It has since evolved to infect IoT devices worldwide.


MDBR prevents systems from connecting to harmful web domains, limiting infections related to malware, ransomware, phishing, and other cyber threats.


Malicious Domain Blocking and Reporting available to U.S. public and private hospitals, blocks harmful web domains from accessing hospital IT systems


escription: In June 2021, the MS-ISAC observed BitCoin Miner, Mirai, and Ursnif’s return to the Top 10. The Top 10 Malware variants comprise 62% of total malware activity.


1 2 3 4 5 35