CIS Logo
tagline: Confidence in the Connected World


Multiple vulnerabilities have been discovered in Oracle products, which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Adobe Acrobat and Adobe Reader, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Pay Us or Else
October 9, 2019
Local governments are being targeted by ransomware at an alarming rate, and very few communities are prepared to deal with the threat.


Multiple vulnerabilities have been discovered in iCloud, iTunes, and macOS Catalina.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Cisco products, the most severe of which could allow for arbitrary code execution with root privileges on the affected system.



A vulnerability has been discovered in Exim, which could allow for unauthenticated remote attackers to execute arbitrary system commands on the mail server.



Multiple vulnerabilities have been discovered in the Google Android 10 operating system (OS), the most severe of which could allow for arbitrary code execution.



TrickBot is a modular banking trojan that uses man-in-the-browser attacks to target user financial information and act as a dropper for other malware.


Ransomware is a type of malware that blocks access to a system, device, or file until a ransom is paid. Here are some guidelines to prevent digital damage.


A vulnerability has been discovered in vBulletin which could allow for remote code execution when a malicious POST request is sent to the vulnerable application.



A vulnerability has been discovered in PHP, which could allow an attacker to execute arbitrary code.



A vulnerability has been discovered in LibreOffice, which could allow for arbitrary command execution.



1 2 3 67