CIS Logo
tagline: Confidence in the Connected World


Referred to as “Billion Dollar Scam” by the FBI, Business Email Compromise (BEC) scammers use a spoofed email to trick employees into transferring money.


The insider poses a threat because the legitimate access they have to proprietary systems discounts them from facing traditional cybersecurity defenses.


Breaches are widely observed in the healthcare sector and can be caused by many different types of incidents, including credential-stealing malware.


Distributed denial of service (DDoS) attacks pose a serious problem for healthcare providers who need access to the network to provide proper patient care.


Ransomware is malware that infects systems making them inaccessible until ransom is paid. In the healthcare industry critical processes become inoperable.


Join Michael Kaiser, Executive Director of the National Cyber Security Alliance, for a deeper dive into NCSAM.


Multiple vulnerabilities have been discovered in Adobe Flash Player, the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for remote code execution.



During NSCAM the MS-ISAC conducts a national K-12 "Kids Safe Online" poster contest to encourage young people to use the Internet safely and securely.


Malware
October 1, 2016
Malware can use “costumes” as a disguise and trick you into installing it. Malware has many forms, but if you know what to look for, you can avoid it.


Here is a record of the proclamation for the State Governors to make in support of National Cyber Security Awareness Month.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could result in code execution.



Multiple vulnerabilities have been discovered in OpenSSL, the most severe of which could allow for remote code execution.



A vulnerability has been discovered in IBM WebSphere Application Server that can result in remote code execution.



Multiple vulnerabilities have been discovered in Apple macOS Server, macOS Sierra, iCloud and Safari, the most severe of which could allow for arbitrary code execution.



1 58 59 60 61 62 83