CIS Logo
tagline: Confidence in the Connected World


Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.



A vulnerability in ManageEngine Desktop Central could allow for remote code execution.



Multiple vulnerabilities have been discovered in Cisco Webex Network Recording Player and Cisco Webex Player which could allow an unauthenticated, remote attacker to execute arbitrary code on the system of a targeted user.



Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for remote code execution.



Learn how macro instructions used for automation can be leveraged by cybercriminals – and what to do about it.


Multiple vulnerabilities have been discovered in Red Hat products, the most severe of which could allow for reading of arbitrary files on the affected system.



A vulnerability has been discovered in the WordPress Duplicator Plugin that could allow for Arbitrary File Downloads.



In January 2020, the Top 10 Malware composition was very consistent with December 2019 with only a few new additions to the list.


A vulnerability has been discovered in Apache Tomcat, which could allow for reading of arbitrary files on the affected system.



A vulnerability has been discovered in OpenSMTPD which would allow for remote code execution and local privilege escalation.



Multiple vulnerabilities have been discovered in Moxa PT-7528 and PT-7828 Series Ethernet Switches, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



A vulnerability has been discovered in Cisco Smart Software Manager On-Prem which could allow for privileged read and write access to the affected system.



Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow for arbitrary code execution.



1 3 4 5 6 7 77