CIS Logo
tagline: Confidence in the Connected World


Learn how to secure against Emotet Malware in a joint paper written by the Cybersecurity and Infrastructure Security Agency & the MS-ISAC.


Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for remote code execution.



As medical facilities strain amid the pandemic, they’re especially vulnerable to ransomware attacks. Volunteer experts have stepped into the breach.


Top 10 Malware August 2020
September 28, 2020
The Top 10 Malware variants in August 2020 composed 78% of Total Malware activity in August 2020, which is up from 60% in July.


Multiple vulnerabilities have been discovered in iCloud for Windows and macOS.



Multiple vulnerabilities have been discovered in Microsoft Edge, the most severe of which could allow for arbitrary code execution.



LokiBot Malware
September 22, 2020
LokiBot uses a credential & information stealing malware that has been used for a broad range of cyber actors across a variety of data compromise use cases.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Mozilla Firefox and Mozilla Firefox ESR, the most severe of which could allow for arbitrary code execution.



Cosmic Lynx is a Russian criminal organization that has conducted more than 200 BEC-centric campaigns, posing a significant threat to businesses worldwide.


Multiple vulnerabilities have been discovered in iOS, iPadOS, watchOS, tvOS, watchOS, Xcode, and Safari.



Malware is a common tactic cybercriminals use to attack SLTT government entities by directing individuals to malicious domains.


Multiple vulnerabilities have been discovered in Palo Alto PAN-OS, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Adobe InDesign, Adobe Framemaker, and Adobe Experience Manager, the most severe of which could allow for arbitrary code execution.



Since the service went live in early August, 346 MS-ISAC and EI-ISAC members have blocked more than 10 million requests from malicious entities.


1 2 3 4 84