CIS Logo
tagline: Confidence in the Connected World


Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in VMware’s vRealize Operations Manager (vROP), the most severe of which could allow for arbitrary code execution.



A vulnerability has been discovered in the Elementor Pro Plugin that could allow for remote code execution.



Multiple vulnerabilities have been discovered in Cisco Products, the most severe of which could allow for directory traversal attacks.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Mozilla Firefox and Mozilla Firefox ESR, the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in SaltStack, the most severe of which could allow for arbitrary code execution.



The Multi-State Information Sharing and Analysis Center has created a list of End-of-Support (EOS) software dates from 1/01/2019 to 4/2020.


Multiple vulnerabilities have been discovered in Magento CMS, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Adobe Bridge that could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in the Autodesk FBX-SDK library, the most severe of which could allow for arbitrary code execution.



This COVID-19 cybersecurity resource guide from CIS provides information about common cyber-attacks that are currently being reported.


1 2 3 4 77