CIS harnesses the power of collaboration from a community of cybersecurity experts to safeguard public and private organizations against cyber threats.


As the MS-ISAC has grown over the years, it’s helped foster a culture of intelligence sharing among state and local governments.


CIS has become a leader in supporting both public and private organizations in the COVID era, when many are shifting more of their workforce remote.


As the focal point for cyber thereat prevention, protection, response, and recovery for U.S. SLTTs, the MS-ISAC reached 10,000 members in November 2020.


Multiple vulnerabilities have been discovered in VMware SD-WAN Orchestrator, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Mozilla Firefox, Firefox Extended Support Release (ESR) and Mozilla Thunderbird, the most severe of which could allow for arbitrary code execution.



A vulnerability has been discovered in the Drupal core module, which could allow for remote code execution.



Two malware, Bolek and NanoCore, returned to the Top 10 Malware in October 2020 and two new variants, DirectsX and Glupteb, entered the Top 10 Malware.


The December 2020 ISAC National Webinar discussed why open source anonymizing tools exist and how to use them. The recording is now available to view.


The November 2020 MS-ISAC newsletter provides detailed guidance on what ransomware is and actions you can take to defend against it.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



A vulnerability has been discovered in Mozilla Firefox, Firefox Extended Support Release (ESR) and Mozilla Thunderbird, which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Apple Products.



1 2 3 4 5 87