CIS Logo
tagline: Confidence in the Connected World


Multiple vulnerabilities have been discovered in Cisco Products, the most severe of which could allow for directory traversal attacks.



CIS has chosen to better support our users by officially deprecating CIS Benchmarks for technologies that are no longer supported by the technology vendor.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Mozilla Firefox and Mozilla Firefox ESR, the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in SaltStack, the most severe of which could allow for arbitrary code execution.



For this edition of the CIS Controls Volunteer Spotlight, we spoke with Giacomo Lunardon, from Asti, Italy who recently translated the CIS Controls V7.1


Multiple vulnerabilities have been discovered in Magento CMS, the most severe of which could allow for arbitrary code execution.



Discover how OVAL and Joval help protect organizations against cyber vulnerabilities.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Adobe Bridge that could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in the Autodesk FBX-SDK library, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



This COVID-19 cybersecurity resource guide from CIS provides information about common cyber-attacks that are currently being reported.


Perhaps you need a new security mindset – one that can focus your resources on what really matters. Start looking at security from the inside out.


1 4 5 6 7 8 125