CIS Logo
tagline: Confidence in the Connected World


A vulnerability has been discovered in PHP, which could allow an attacker to execute arbitrary code.



A vulnerability has been discovered in LibreOffice, which could allow for arbitrary command execution.



Multiple vulnerabilities have been discovered in Xcode, tvOS, Safari, iOS, iPadOS, watchOS, Mojave, High Sierra and Sierra.



Multiple vulnerabilities have been discovered in Adobe ColdFusion, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Microsoft Internet Explorer and Microsoft Defender, the most severe of which could allow for code execution.



Join the MS-ISAC, EI-ISAC, CISA and National Cyber Security Alliance for a deeper dive into National Cybersecurity Awareness Month.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Security Primer – IcedID
September 18, 2019
IcedID, also known as BokBot, is a modular banking trojan that targets user financial information and is capable of acting as a dropper for other malware.


Teaching cybersecurity to children at a young age can be very beneficial for them in the long run as they learn to recognize potential cybersecurity risks.


Multiple vulnerabilities have been identified in Mozilla Thunderbird, the most severe of which could allow for arbitrary code execution.



Simple nudges that affect behavior at the keyboard and keep employees on high alert can be far more effective than expensive cybersecurity bells and whistles.


Online safety begins by talking about it and encouraging safe and smart decisions about online activity. Learn how to keep everyone safe online.


The Multi-State Information Sharing and Analysis Center has created a list of End-of-Support (EOS) software dates from 1/01/2019 to 4/2020.


Multiple vulnerabilities have been discovered in Adobe Flash Player which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.



1 2 3 4 68