CIS Logo
tagline: Confidence in the Connected World


Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Cisco products, the most severe of which could allow for arbitrary code execution with root privileges on the affected system.



A vulnerability has been discovered in Exim, which could allow for unauthenticated remote attackers to execute arbitrary system commands on the mail server.



Multiple vulnerabilities have been discovered in the Google Android 10 operating system (OS), the most severe of which could allow for arbitrary code execution.



TrickBot is a modular banking trojan that uses man-in-the-browser attacks to target user financial information and act as a dropper for other malware.


Ransomware is a type of malware that blocks access to a system, device, or file until a ransom is paid. Here are some guidelines to prevent digital damage.


A vulnerability has been discovered in vBulletin which could allow for remote code execution when a malicious POST request is sent to the vulnerable application.



A vulnerability has been discovered in PHP, which could allow an attacker to execute arbitrary code.



A vulnerability has been discovered in LibreOffice, which could allow for arbitrary command execution.



Multiple vulnerabilities have been discovered in Xcode, tvOS, Safari, iOS, iPadOS, watchOS, Mojave, High Sierra and Sierra.



Multiple vulnerabilities have been discovered in Adobe ColdFusion, the most severe of which could allow for arbitrary code execution.



Ryuk is a type of crypto-ransomware that uses encryption to block access to a system, device, or file until a ransom is paid.


Multiple vulnerabilities have been discovered in Microsoft Internet Explorer and Microsoft Defender, the most severe of which could allow for code execution.



Join the MS-ISAC, EI-ISAC, CISA and National Cyber Security Alliance for a deeper dive into National Cybersecurity Awareness Month.


1 2 3 4 5 69