CIS Logo
tagline: Confidence in the Connected World


Hospitals, businesses, and other networks have for years been targets of ransomware attacks. Now, hackers have increasingly focused on local governments.


Cybersecurity is a growing industry. Discover the skills needed to be successful in this industry and resources to help with professional development.


In July 2019, the top 10 malware activity accounted for 66% of total malware activity, a 3% increase over June. Cerber and Brambul activity returned.


This webinar highlights Implementation Group 1, which can help enhance cyber hygiene along with how to measure application in Windows 10 environments.


Multiple vulnerabilities have been discovered in Adobe Acrobat and Adobe Reader, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Adobe Photoshop CC, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.



The top concern raised by chief information security officers has been the lack of cybersecurity budget or funding, according to NASCIO reports.


Multiple vulnerabilities have been discovered in Cisco Small Business 220 Series Smart Switches, the most severe of which could allow an unauthenticated, remote attacker to execute arbitrary code with root privileges on a targeted system.



Multiple vulnerabilities have been discovered in Cisco WebEx Network Recording Player and Cisco Webex Player which could allow an unauthenticated, remote attacker to execute arbitrary code on the system of a targeted user.



Some argue paying the hackers in bitcoins is a good option because it’s cheaper to pay the attacker, rather than spend a small fortune to rebuild an entire computer system.


Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow an attacker to execute arbitrary code.



The Multi-State Information Sharing and Analysis Center has created a list of End-of-Support (EOS) software dates from 1/01/2019 to 4/2020.


1 2 3 63