CIS Logo
tagline: Confidence in the Connected World


Shlayer returned to the Top 10 Malware after new evidence resulted in it being reclassified as a Trojan Downloader compared to an Adware Dropper.


October 23 - UPDATED: Multiple vulnerability has been discovered in Cisco Adaptive Security Appliance and Firepower Threat Defense, which could allow for a denial of service condition.



Multiple vulnerabilities have been discovered in Mozilla Firefox and Mozilla Firefox ESR, the most severe of which could allow for arbitrary code execution.



The October 2020 MS-ISAC newsletter discusses the importance of securing a remote office and provides six suggestions to get folks started.


In September 2020, there was a return of three malware and the Top 10 Malware variants composed 87% of Total Malware activity.


Multiple vulnerabilities have been discovered in HP Intelligent Management Center (iMC), the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Oracle products, which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



This document sets forth an actionable approach to ensure each state has cyber governance, and can maximize investments while securing their state.


Multiple vulnerabilities have been discovered in SonicWALL Sonic OS, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Magento CMS, the most severe of which could allow for arbitrary code execution.



A vulnerability has been discovered in Juniper Junos OS, which could allow for denial of service.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.



A vulnerability has been discovered in Adobe Flash Player, which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



1 2 3 84