×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

Secure Your Organization


Secure Specific Platforms


U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

Secure Your Organization


Learn


Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



Multiple vulnerabilities have been discovered in Cisco HyperFlex HX software, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Cisco SD-WAN vManage Software, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Exim, the most severe of which could allow for remote code execution.



The primary method of cyberattacks has been unsophisticated spear-phishing campaigns to infect networks with malicious ransomware.


Thursday, May 20, 2021 | 2:00 PM EDT Looking for next steps after completing the NCSR The MS-ISAC and experienced NCSR participants will give an



Multiple vulnerabilities have been discovered in Apple Products, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for remote code execution.



A vulnerability has been discovered in HPE Edgeline Infrastructure Manager Software that could allow for remote code execution.



According to a new NASCIO, NASPO, and CIS guide, the complexity of technology over the last twenty years has made the acquisition process complex as well.


Multiple vulnerabilities have been discovered in Real-Time Operating Systems (RTOS), the most severe of which could allow for remote code execution.



In March 2021, the MS-ISAC observed Blaknight and Danabot’s return to the Top 10, while CopperStealer made its first appearance.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Apple Products, the most severe of which could allow for arbitrary code execution.



The MS-ISAC's CTI team assessed that ransomware groups will continue to leverage stolen data throughout 2021.


Multiple vulnerabilities in SonicWall Email Security (ES) could allow for arbitrary code execution.



1 2 3 92