CIS Logo
tagline: Confidence in the Connected World


According to Idaho Cybersecurity Awareness, approximately 60% of small businesses are forced to shutter their doors within just six months of a breach.


As the world moves to the cloud, cybercriminals are exploiting teleworking capabilities, making countering COVID-19 and cyber-attacks a priority.


A vulnerability has been discovered in F5 BIG-IP Edge Client for Windows, which could allow for remote code execution.



Multiple vulnerabilities have been discovered in GRUB2, the most severe of which could allow for complete system compromise.



Multiple vulnerabilities have been discovered in Mozilla Firefox and Thunderbird, the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Adobe Bridge that could allow for arbitrary code execution.



Top 10 Malware composition was fairly consistent through May 2020, with the exception of Quasar, SocGholish, and Ursnif.


The tabletop series will focus on protecting the integrity of New York’s electoral process against cyber-attacks directed at the state’s election systems.


Multiple vulnerabilities have been discovered in iOS, iPadOS, macOS, tvOS, watchOS, and Safari.



Multiple vulnerabilities have been discovered in Cisco Devices, the most severe of which could allow for remote command execution.



The cyber info sharing pilot is specifically aimed at generating actionable data for cyber response and mitigating reliance on manual tasks.


The results of the pilot could serve as a model for other states and local governments to quickly and easily augment their cyber defense capabilities.


Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could result in arbitrary code execution.



1 2 3 4 81