Menu
CIS Security Advisories
CIS Security News
CISA News
ISACA SmartBrief
Cyber Security Advisories – MS-ISAC
- Multiple Vulnerabilities in Palo Alto PAN-OS Could Allow for Authentication Bypass 2024-11-18Multiple vulnerabilities have been discovered in Palo Alto PAN-OS, the most severe of which could allow for authentication bypass. PAN-OS is the software that runs all Palo Alto Networks next-generation firewalls. Successful exploitation could allow for authentication bypass with administrator privileges. An attacker could then install programs; view, change, or delete data.
- Multiple Vulnerabilities in Ivanti Endpoint Manager Could Allow for Remote Code Execution 2024-11-13Multiple vulnerabilities have been discovered in Ivanti Endpoint Manager, the most severe of which could allow for remote code execution. Ivanti Endpoint Manager is a client-based unified endpoint management software. Successful exploitation could allow for remote code execution in the context of the system. Depending on the privileges associated with the system, an attacker could […]
- Multiple Vulnerabilities in Citrix Products Could Allow for Remote Code Execution 2024-11-13Multiple vulnerabilities have been discovered in Citrix products, the most severe of which could allow for remote code execution. Citrix ADC performs application-specific traffic analysis to intelligently distribute, optimize, and secure Layer 4 - Layer 7 network traffic for web applications. Successful exploitation of the most severe of these vulnerabilities could allow for remote code […]
- Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution 2024-11-13Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install […]
- Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution 2024-11-13Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install […]
- Critical Patches Issued for Microsoft Products, November 12, 2024 2024-11-13Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users […]
- A Vulnerability in Android OS Could Allow for Remote Code Execution 2024-11-07A vulnerability has been discovered in Android OS that could allow for remote code execution. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of this vulnerability could allow for remote code execution in the context of the logged-on user. Depending on the privileges […]
- A Vulnerability in Cisco Unified Industrial Wireless Software for Ultra-Reliable Wireless Backhaul Access Point Could Allow for Remote Code Execution 2024-11-06A vulnerability has been discovered in Cisco Unified Industrial Wireless Software for Ultra-Reliable Wireless Backhaul Access Point that could allow for remote code execution. Cisco Unified Industrial Wireless Software for Ultra-Reliable Wireless Backhaul Access Point is Cisco’s solution to address wireless and mobile use case issues facing enterprises. Successful exploitation could allow the attacker to […]
- Multiple Vulnerabilities in Siemens InterMesh Subscriber Devices Could Allow for Remote Code Execution 2024-10-29Multiple vulnerabilities have been discovered in Siemens InterMesh Subscriber Devices, the most severe of which could allow for remote code execution. InterMesh leverages mesh radio technology and hardened alarm monitoring panels to create a private, self-healing network that delivers alarm signals. Successful exploitation of the most severe of these vulnerabilities could allow for remote code […]
- Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution 2024-10-29Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install […]
Blog Feed – Center for Internet Security
- CIS Benchmarks November 2024 Update 2024-11-07Here is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for November 2024.
- Top 10 Malware Q3 2024 2024-10-25In Q3 2024, the Top 10 Malware observed via the monitoring services of the MS-ISAC® changed moderately from the previous quarter. See what's new.
- CIS Benchmarks October 2024 Update 2024-10-07Here is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for October 2024.
- 11 Cyber Defense Tips to Stay Secure at Work and Home 2024-10-04To uphold your personal responsibility for cybersecurity, here are 11 steps that you can use to strengthen your cyber defense at home and at work.
- CIS Benchmarks Community Volunteer Spotlight: Rick Handley 2024-09-25Learn about CIS Benchmarks Community Volunteer Rick Handley. Handley has been a Community Member for 10 years and has a background in Microsoft 365 security.
- CIS Controls Community Volunteer Spotlight: Shane Markley 2024-09-23Members of the CIS Controls Community volunteer their expertise and time for the greater good of cybersecurity. Shane Markley shares how he plays his part.
- CIS Hardened Images: Reconciling Cloud Security and Services 2024-09-16Don't want cloud security to limit performance or availability? Learn how we've been testing CIS Hardened Images with cloud services to support your needs!
- 8 Security Essentials for Managing Your Online Presence 2024-09-13
- How to Integrate CSPM into Your Clients’ IaaS Strategy 2024-09-12Want to protect your clients against breaches in the cloud? Learn how the CIS Hardened Images can help your clients take a comprehensive approach to CSPM.
- Building a Reasonable Cyber Defense Program 2024-09-11Looking to build a reasonable cyber defense program? Here are seven policy elements you can incorporate into your program with the help of CIS SecureSuite®.
ICS Advisories
- Mitsubishi Electric MELSEC iQ-F Series 2024-11-19View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Mitsubishi Electric Corporation Equipment: MELSEC iQ-F Series Vulnerability: Improper Validation of Specified Type of Input 2. RISK EVALUATION Successful exploitation of this vulnerability could allow a remote attacker to cause a denial-of-service condition in Ethernet communication on the module. A system […]CISA
- Siemens SINEC NMS 2024-11-14As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global). View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.3 ATTENTION: Exploitable remotely/low attack […]CISA
- Siemens Solid Edge 2024-11-14As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global). View CSAF 1. EXECUTIVE SUMMARY CVSS v4 7.3 ATTENTION: Low Attack Complexity […]CISA
- Siemens SCALANCE M-800 Family 2024-11-14As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global). View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.6 ATTENTION: Exploitable remotely/low attack […]CISA
- Siemens Engineering Platforms 2024-11-14As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global). View CSAF 1. EXECUTIVE SUMMARY CVSS v4 7.0 ATTENTION: Low Attack Complexity […]CISA
- Siemens SINEC INS 2024-11-14As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global). View CSAF 1. EXECUTIVE SUMMARY CVSS v3 9.9 ATTENTION: Exploitable remotely/low attack […]CISA
- Siemens Spectrum Power 7 2024-11-14As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global). View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.5 ATTENTION: Low attack complexity […]CISA
- Siemens RUGGEDCOM CROSSBOW 2024-11-14As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global). View CSAF 1. EXECUTIVE SUMMARY CVSS v3 5.5 ATTENTION: Exploitable from adjacent […]CISA
- Siemens SIMATIC CP 2024-11-14As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global). View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack […]CISA
- Siemens Mendix Runtime 2024-11-14As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global). View CSAF 1. EXECUTIVE SUMMARY CVSS v4 6.9 ATTENTION: Exploitable remotely/low attack […]CISA
ISACA SmartBrief on Cybersecurity
- AI agents to take visible role in enterprise in 2025 2024-11-20AI agents are poised to play a more active role in enterprise operations in 2025, moving beyond tasks handled by robotic proc -More-
- While armchair travelers dream of going places, traveling armchairs dream of staying put. 2024-11-20Anne Tyler, writer, Pulitzer Prize for Fiction recipient
- How AI-Enhanced Security is Transforming Customer Data Protection 2024-11-20In customer relationship management, emerging AI technology is vital for enhancing security measures. -More-
- Ransomware attack at Okla. hospital affects 133K people 2024-11-20Great Plains Regional Medical Center in Oklahoma experienced a ransomware attack in September, compromising the data of 133,0 -More-
- AI adoption highlights significant skills gap 2024-11-20A significant gap exists between AI adoption and employee training, with 75% of companies using AI but only one-third of empl -More-
- How cyber-informed engineering is evolving 2024-11-20Manual operations and large reservoirs as engineering tools can help mitigate risks not covered by cybersecurity standards, a -More-
- Broadcom: VMware vCenter Server bugs exploited 2024-11-20Broadcom has issued a warning that a pair of VMware vCenter Server vulnerabilities are being actively exploited. -More-
- WordPress plug-in flaw patched after exposing 4M sites 2024-11-20A critical vulnerability in the Really Simple Security plug-in for WordPress has been patched after affecting more than 4 mil -More-
- AI behavioral analysis can bolster email security 2024-11-20AI-based behavioral analysis is a powerful tool against sophisticated email threats such as business email compromise and ven -More-