Filters

Filter By525 Results FoundClear Filters
Type

Topic

Showing results 1 - 20 of 525 for "iPhone vulnerabilities"

Vulnerabilities in Thunderbird Email Client Allow Code Execution
MEDIA MENTION - https://www.cisecurity.org/about-us/media/media-mention/vulnerabilities-in-thunderbird-emai...

Vulnerabilities in Thunderbird Email Client Allow Code Execution

Security updates for the Thunderbird email client address vulnerabilities that could be exploited to execute arbitrary code on impacted systems....

For the second time in less than a year, F5 announces critical vulnerabilities in networking devices
MEDIA MENTION - https://www.cisecurity.org/about-us/media/media-mention/for-the-second-time-in-less-than-a-...

For the second time in less than a year, F5 announces critical vulnerabilities in networking devices

F5 BIG-IP networking devices are popular across industries and are used by most large organizations, including many major cloud service providers....

CIS Logo
MEDIA MENTION - https://www.cisecurity.org/about-us/media/media-mention/cyber-threat-actors-continue-to-exp...

Cyber threat actors continue to exploit vulnerabilities in Ivanti products

The Multi-State Information Sharing and Analysis Center (MS-ISAC) has issued a joint advisory with the Cybersecurity and Infrastructure Security Agenc...

7 Vulnerabilities in Popular DNS Forwarding Software Open Door to Range of Attacks
MEDIA MENTION - https://www.cisecurity.org/about-us/media/media-mention/7-vulnerabilities-in-popular-dns-fo...

7 Vulnerabilities in Popular DNS Forwarding Software Open Door to Range of Attacks

For public LANs, a poisoned DNS cache could allow an attacker to potentially poison up to 10 different domains simultaneously....

CIS
ADVISORY - https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-google-android-os-could-all...

2025-013: Multiple Vulnerabilities in Google Android OS Could Allow for Privilege Escalation

Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for privilege escalation. Android is an op...

CIS Vulnerability Management Policy Template
WHITE PAPER - https://www.cisecurity.org/insights/white-papers/controls-v8-1-vulnerability-management-pol...

CIS Controls v8.1 Vulnerability Management Policy Template

Cybersecurity professionals are constantly challenged by attackers searching for vulnerabilities to exploit and gain access....

CIS
ADVISORY - https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-google-android-os-could-all...

2025-081: Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution

Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for remote code execution. Android is an o...

CIS
ADVISORY - https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-google-android-os-could-all...

2025-025: Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution

Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for remote code execution with no addition...

CIS
ADVISORY - https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-google-android-os-could-all...

2024-133: Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution

Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for remote </s...

CIS
ADVISORY - https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-google-android-os-could-all...

2024-110: Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution

Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for remote cod...

CIS
ADVISORY - https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-google-android-os-could-all...

2025-047: Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution

Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for remote code execution with no addition...

Tenable Vulnerability Management logo
PAGE - https://www.cisecurity.org/services/cis-cybermarket/tenable-vulnerability-management

Tenable Vulnerability Management

Wanting greater visibility of your U.S. SLTT's vulnerabilities? Get to know your IT environment with Tenable Vulnerability Management....

Election Security Spotlight – Zero-day Exploits and Vulnerabilities
SPOTLIGHT - https://www.cisecurity.org/insights/spotlight/cybersecurity-spotlight-zero-day-exploits-and...

Election Security Spotlight – Zero-day Exploits and Vulnerabilities

What it is A zero-day exploit is a cyber attack that targets a flaw in a system before developers or the public are aware it exists. Zero-day exploits...

CIS
ADVISORY - https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-sonicwall-sonicos-could-all...

2025-002: Multiple vulnerabilities in SonicWall SonicOS could allow a remote attacker to bypass authentication.

Multiple vulnerabilities have been discovered in SonicWall SonicOS that could allow for authentication bypass. SonicOS is SonicWall’s operating sys...

CIS
ADVISORY - https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-google-android-os-could-all...

2025-103: Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution

Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for remote code execution. Android is an o...

Timely Patching Reduces System Compromises blog article
BLOG POST - https://www.cisecurity.org/insights/blog/timely-patching-reduces-system-compromises

Timely Patching Reduces System Compromises

Timely patching is one of the most important cybersecurity controls preventing system compromise – especially amid growing cyber threats....

CIS
ADVISORY - https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-ivanti-endpoint-manager-cou...

2026-013: Multiple Vulnerabilities in Ivanti Endpoint Manager Could Allow for Authentication Bypass

Multiple vulnerabilities have been discovered in Ivanti Endpoint Manager, the most severe of which could allow for authentication bypass. Ivanti En...