CIS Security Advisories
CIS Security News
CISA News
ISACA SmartBrief
 Cyber Security Advisories – MS-ISAC
 Cyber Security Advisories – MS-ISAC
- A Vulnerability in Microsoft Windows Server Update Services (WSUS) Could Allow for Remote Code Execution 2025-10-24A vulnerability has been discovered in Microsoft Windows Server Update Services (WSUS) which could allow for remote code execution. WSUS is a tool that helps organizations manage and distribute Microsoft updates across multiple computers. Instead of every PC downloading updates from Microsoft’s servers, WSUS downloads the updates and stores them, then distributes them to all […]
- Oracle Quarterly Critical Patches Issued October 21, 2025 2025-10-22Multiple vulnerabilities have been discovered in Oracle products, the most severe of which could allow for remote code execution.
- Multiple Vulnerabilities in Ivanti Products Could Allow for Remote Code Execution 2025-10-16Multiple vulnerabilities have been discovered in Ivanti products, the most severe of which could allow for remote code execution. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution in the context of the system.Ivanti Endpoint Manager is a client-based unified endpoint management software.Ivanti Endpoint Manager Mobile (Ivanti EPMM) is […]
- Critical Patches Issued for Microsoft Products, October 14, 2025 2025-10-16Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution. Successful exploitation of the most severe of these vulnerabilities could result in an attacker gaining the same privileges as the logged-on user. Depending on the privileges associated with the user, an attacker could then install programs; […]
- Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution 2025-10-16Multiple vulnerabilities have been discovered in Mozilla products, the most severe of which could allow for arbitrary code execution.*Mozilla Firefox is a web browser used to access the Internet.Mozilla Firefox ESR is a version of the web browser intended to be deployed in large organizations.Mozilla Thunderbird is an email client.Mozilla Thunderbird ESR is a version […]
- Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution 2025-10-16Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Adobe Connect is a software suite for online collaboration.Adobe Commerce is an enterprise-grade eCommerce platform that provides tools for creating and managing online stores for both B2B and B2C businesses.Magento Open Source is a free, downloadable eCommerce platform […]
- A Vulnerability in Oracle E-Business Suite Could Allow for Remote Code Execution 2025-10-16A vulnerability has been discovered in Oracle E-Business Suite, which could allow for remote code execution. Oracle E-Business Suite (EBS) is a comprehensive suite of integrated business applications that runs core enterprise functions. Successful exploitation of this vulnerability could allow an actor to execute code in the context of the affected component. An attacker could […]
- Multiple Vulnerabilities in VMware Aria Operations and VMware Tools Could Allow for Privilege Escalation 2025-10-01Multiple vulnerabilities have been discovered in VMware Aria Operations and VMware Tools, the most severe of which could allow for privilege escalation to root. VMware Aria is a multi-cloud management platform that provides automation, operations, and cost management for applications and infrastructure across private, public, and hybrid cloud environments. Successful exploitation of the most severe […]
- Multiple Vulnerabilities in Cisco Products Could Allow for Remote Code Execution 2025-09-25Multiple vulnerabilities have been discovered in Cisco products, the most severe of which could allow for remote code execution. Cisco is a leading technology company best known for its networking hardware and software, such as routers and switches, that form the backbone of the internet and enterprise networks. Successful exploitation of the most severe of […]
- A Vulnerability in Nx (build system) Package Could Allow for Sensitive Data Exfiltration 2025-09-25A vulnerability has been discovered in Nx (build system) Package, which could allow for sensitive data exfiltration. Nx is a smart, fast, and extensible build system designed for managing monorepos efficiently by providing features like dependency graph analysis, computation caching, distributed task execution, and codebase upgrades. Successful exploitation of this vulnerability could allow an attacker […]
 Blog Feed – Center for Internet Security
 Blog Feed – Center for Internet Security
- MS-ISAC Member-Reported Phishing Likely from Tycoon2FA PhaaS 2025-10-29The CIS CTI team saw an uptick in member-submitted phishing emails in Q3 2025. Learn the overlap these emails have with the Tycoon2FA PhaaS kit.
- How Secure by Design Helps Developers Build Secure Software 2025-10-28Secure by Design offers practical, risk-based strategies for integrating security into the software development lifecycle.
- ClickFix: An Adaptive Social Engineering Technique 2025-10-27The CIS CTI tracked two ClickFix campaigns between January 2025 and October 2025. Learn more about them and how to defend yourself.
- Simplify Security Management with CIS SecureSuite Platform 2025-10-16Looking to simplify security management and accelerate audits? Read our blog post to learn how our CIS SecureSuite Platform can help!
- Building a Secure Cloud Foundation for Healthcare with CIS 2025-10-14Learn how to accelerate your healthcare compliance with CIS Hardened Images and CIS SecureSuite for secure, audit-ready cloud environments.
- Reasonable Cybersecurity: From Legal Theory to Practice 2025-09-24Explore how reasonable cybersecurity is evolving from a legal concept into a practical standard for protecting systems and consumer data.
- CIS Helps Strengthen Cybersecurity in Energy & Utilities 2025-09-23Discover how CIS Benchmarks and CIS Controls help energy and utility companies strengthen cybersecurity across IT and OT environments.
- CIS Benchmarks Monthly Update September 2025 2025-09-23The following CIS Benchmarks and CIS Build Kits have been updated or recently released. We've highlighted the major updates below.
- Qilin Top Ransomware Threat to SLTTs in Q2 2025 2025-09-11In Q2 2025, Qilin became the most active ransomware targeting U.S. SLTT government entities. Read the CIS CTI team's analysis to learn more.
- Top External Network Risks And How to Fix Them 2025-08-27Learn about the top external network risks and recommendations to harden configurations from the CIS Cyber Threat Intelligence team.
 All CISA Advisories
 All CISA Advisories
- CISA Adds Two Known Exploited Vulnerabilities to Catalog 2025-10-30CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-24893 XWiki Platform Eval Injection Vulnerability CVE-2025-41244 Broadcom VMware Aria Operations and VMware Tools Privilege Defined with Unsafe Actions Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to […]CISA
- Hitachi Energy TropOS 2025-10-30View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: Hitachi Energy Equipment: TropOS Vulnerabilities: OS Command Injection, Improper Privilege Management 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow command injections and privilege escalation. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS Hitachi Energy reports TropOS wireless devices are affected when […]CISA
- New Guidance Released on Microsoft Exchange Server Security Best Practices 2025-10-30Today, CISA, in partnership with the National Security Agency and international cybersecurity partners, released Microsoft Exchange Server Security Best Practices, a guide to help network defenders harden on-premises Exchange servers against exploitation by malicious actors. Threat activity targeting Exchange continues to persist, and organizations with unprotected or misconfigured Exchange servers remain at high risk of […]CISA
- CISA Releases Two Industrial Control Systems Advisories 2025-10-30CISA released two Industrial Control Systems (ICS). These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-303-01 International Standards Organization ISO 15118-2 ICSA-25-303-02 Hitachi Energy TropOS CISA encourages users and administrators to review newly released ICS Advisories for technical details and mitigations.CISA
- International Standards Organization ISO 15118-2 2025-10-30View CSAF 1. EXECUTIVE SUMMARY CVSS v4 7.2 ATTENTION: Low Attack Complexity Standard: ISO 15118-2 Network and Application Protocol Requirements Equipment: EV Car Chargers Vulnerability: Improper Restriction of Communication Channel to Intended Endpoints 2. RISK EVALUATION Successful exploitation of this vulnerability could result in man-in-the-middle attacks. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following ISO […]CISA
- Schneider Electric EcoStruxure 2025-10-28View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.2 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: EcoStruxure Vulnerability: Allocation of Resources Without Limits or Throttling 2. RISK EVALUATION Successful exploitation of this vulnerability could result in the loss of real-time process data from the Modicon Controller. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS Schneider Electric […]CISA
- CISA Adds Two Known Exploited Vulnerabilities to Catalog 2025-10-28CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-6204 Dassault Systèmes DELMIA Apriso Code Injection Vulnerability CVE-2025-6205 Dassault Systèmes DELMIA Apriso Missing Authorization Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Binding […]CISA
- Vertikal Systems Hospital Manager Backend Services 2025-10-28View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: Vertikal Systems Equipment: Hospital Manager Backend Services Vulnerabilities: Exposure of Sensitive System Information to an Unauthorized Control Sphere, Generation of Error Message Containing Sensitive Information 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to obtain unauthorized access […]CISA
- CISA Releases Three Industrial Control Systems Advisories 2025-10-28CISA released three Industrial Control Systems (ICS) Advisories. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-301-01 Schneider Electric EcoStruxure ICSMA-25-301-01 Vertikal Systems Hospital Manager Backend Services ICSA-24-352-04 Schneider Electric Modicon (Update B) CISA encourages users and administrators to review newly released ICS Advisories for technical details and mitigations.CISA
- CISA Adds Two Known Exploited Vulnerabilities to Catalog 2025-10-24CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-54236 Adobe Commerce and Magento Improper Input Validation Vulnerability CVE-2025-59287 Microsoft Windows Server Update Service (WSUS) Deserialization of Untrusted Data Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and poses significant risks to […]CISA
 ISACA SmartBrief on Cybersecurity
 ISACA SmartBrief on Cybersecurity
- Q&A: Neurotechnology brings a new set of data risks 2025-10-31Nita Farahany, an expert on neural data privacy, discusses the risks of neurotechnology, including the potential for brain da -More-
- Who Said It?   The truth is that monsters are real, and ghosts are real too. They live inside us, and sometimes, they win. 2025-10-31Stephen King or John Dos PassosCheck your answer here.
- Dentsu reports data breach at Merkle, potential leak 2025-10-31Dentsu has disclosed a data breach affecting Merkle, its customer experience management subsidiary, after unusual activity wa -More-
- CISOs face challenge of translating skills to new sectors 2025-10-31Transitioning between industries can be challenging for chief information security officers, as executives and recruiters oft -More-
- Photos could be used to create convincing voice deepfakes 2025-10-31A study by Australia's national science agency has found that a technique called Face-to-Voice can generate synthetic speech -More-
- Flaws in Elementor add-on threaten WordPress sites 2025-10-31Patchstack has identified two critical vulnerabilities in King Addons for Elementor, a plug-in used on more than 10,000 WordP -More-
- Chromium browsers crash from "Brash" exploit 2025-10-31A vulnerability in Chromium's Blink rendering engine, dubbed "Brash," can crash Chromium-based browsers in seconds via a mali -More-
 
															 
															 
															 
															 
															 
								