CIS Logo
tagline: Confidence in the Connected World


A single phishing campaign can bring in millions. Learn how you can spot phishing emails and avoid putting your organization at risk of a cyber-attack.


The hacking group, Rancor, sent emails to one Southeast Asian government containing malicious code that looked like legitimate government documents.


Check out six simple tips to discover how to keep your workplace safe online, to improve your organization's cybersecurity defense and minimize risk.


A vulnerability has been discovered in Exim, which could allow for unauthenticated remote attackers to execute arbitrary system commands on the mail server.



Multiple vulnerabilities have been discovered in the Google Android 10 operating system (OS), the most severe of which could allow for arbitrary code execution.



The CIS Security Best Practices for Non-Voting Election Technology provides cybersecurity recommendations for supporting election technology.


TrickBot is a modular banking trojan that uses man-in-the-browser attacks to target user financial information and act as a dropper for other malware.


There are no reports of this vulnerability being exploited in the wild, MS-ISAC assess the risk to government and business entities of all sizes to be high.


Ransomware is a type of malware that blocks access to a system, device, or file until a ransom is paid. Here are some guidelines to prevent digital damage.


The process of replacing the DREs, which have been used in precincts covering 83 percent of Pennsylvania voters, will cost at least $125 million.


A vulnerability has been discovered in vBulletin which could allow for remote code execution when a malicious POST request is sent to the vulnerable application.



A vulnerability has been discovered in PHP, which could allow an attacker to execute arbitrary code.



The Fall 2019 issue of Cybersecurity Quarterly shares ways to protect against ransomware, the latest guide for implementing the CIS Controls and more.


Multiple vulnerabilities have been discovered in Xcode, tvOS, Safari, iOS, iPadOS, watchOS, Mojave, High Sierra and Sierra.



A vulnerability has been discovered in LibreOffice, which could allow for arbitrary command execution.



1 2 3 4 5 6 108