CIS Security Advisories
CIS Security News
CISA News
ISACA SmartBrief
Cyber Security Advisories – MS-ISAC
- Multiple Vulnerabilities in Progress ShareFile Could Allow for Remote Code Execution 2026-04-02Multiple vulnerabilities have been discovered in Progress ShareFile, which when chained together, could allow for remote code execution. Progress ShareFile is a secure, cloud-based content collaboration and file-sharing platform. It enables businesses to securely exchange documents, manage client workflows, and obtain electronic signatures, with a focus on compliance for industries like finance and healthcare. Successful […]
- Multiple Vulnerabilities in Cisco Products Could Allow for Arbitrary Code Execution 2026-04-02Multiple vulnerabilities have been discovered in Cisco products, the most severe of which could allow for arbitrary code execution. Cisco Smart Software Manager On‑Prem is a centralized Cisco tool used by organizations to manage software licenses, entitlements, and compliance for Cisco products within their own network environment.Cisco Integrated Management Controller (IMC) is embedded server management software […]
- Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution 2026-04-02Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; […]
- Multiple Vulnerabilities in Apple Products Could Allow for Privilege Escalation 2026-04-01Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for privilege escalation. Successful exploitation of the most severe of these vulnerabilities could allow a user to elevate privileges. Depending on the privileges associated with the user, they may be able to modify protected system files.
- A Vulnerability in F5 Products Could Allow for Remote Code Execution 2026-03-30A vulnerability has been discovered in F5 Products that could allow for remote code execution. F5 BIG IP APM is an access policy management solution designed to enforce secure access to applications, APIs, and sensitive data. It is commonly deployed by enterprises, financial institutions, and government or public sector organizations to centrally control authentication, authorization, […]
- Multiple Vulnerabilities in NetScaler ADC and NetScaler Gateway Could Allow for Memory Overread 2026-03-30Multiple Vulnerabilities have been discovered in NetScaler ADC and NetScaler Gateway, the most severe of which could allow for memory overread.NetScaler ADC is a networking product that functions as an Application Delivery Controller (ADC), a tool that optimizes, secures, and ensures the reliable availability of applications for businesses.NetScaler Gateway is a secure remote access solution […]
- A Vulnerability in Oracle Products Could Allow for Remote Code Execution 2026-03-23A vulnerability has been discovered in Oracle Products that could allow for remote code execution. Oracle Identity Manager is an identity management product that automates user provisioning, identity administration, and password management, integrated in a comprehensive workflow engine.Oracle Web Services Manager is a comprehensive security and policy management framework within Oracle Fusion Middleware that allows […]
- Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution 2026-03-13Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; […]
- Multiple Vulnerabilities in Mozilla Firefox Could Allow for Arbitrary Code Execution 2026-03-10Multiple vulnerabilities have been discovered in Mozilla Firefox, the most severe of which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the user an attacker […]
- Critical Patches Issued for Microsoft Products, March 10, 2026 2026-03-10Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution. Successful exploitation of the most severe of these vulnerabilities could result in an attacker gaining the same privileges as the logged-on user. Depending on the privileges associated with the user, an attacker could then install programs; […]
Blog Feed – Center for Internet Security
- IRS-Themed Phishing Granting Threat Actors Remote Access 2026-03-24The CIS CTI team spotted an ongoing campaign targeting SLTT government entities with tax- and IRS-themed phishing lures. Take a closer look.
- ZPHP Campaign Delivering Remcos RAT Impacting SLTTs 2026-03-17CIS CTI identified an ongoing ZPHP campaign impacting U.S. SLTTs that delivers the Remcos RAT. Find out how to defend your organization.
- What’s on My Radar for RSAC 2026: Insights from Tony Sager 2026-03-17Ahead of RSAC 2026 Conference, Tony Sager shares his thoughts about upcoming sessions and how he navigates the conference.
- 2025 Year in Review: Sustaining Cybersecurity 2026-03-16CIS sustained vital protections despite funding cuts and rising multidimensional threats. Learn more by watching our 2025 Year in Review 2025 video.
- CIS Benchmarks March 2026 Update 2026-03-06Here is an overview of the CIS Benchmarks that the Center for Internet Security (CIS) updated or released for March 2026.
- Strengthening Software Assurance Across Government Systems 2026-03-05Secure by Design ultimately supports a broader public mission: delivering trustworthy, secure, and sustainable technology that citizens can rely on.
- How to Defend Against Iran's Cyber Retaliation Playbook 2026-03-04Security leaders must give equal weight to the cyber dimension following U.S.-Israeli kinetic activity against Iran. Here's our recommendations.
- Multiply Endpoint Security's Force at Your Public Utility 2026-02-20A public utility can multiply the force of endpoint security with a 24x7x365 protection and monitoring strategy. Read our blog to learn more.
- Upholding U.S. SLTT Resilience with Affordable Services 2026-02-12The MS-ISAC bridges the U.S. SLTT resilience gap by offering under-resourced organizations access to affordable services. Read to learn more.
- CIS Benchmarks February 2026 Update 2026-02-09Here is an overview of the CIS Benchmarks that the Center for Internet Security (CIS) updated or released for February 2026.
All CISA Advisories
- Hitachi Energy Ellipse 2026-04-02View CSAF Summary Hitachi Energy is aware of a Jasper Report vulnerability that affects the Ellipse product versions mentioned in this document below. This vulnerability can be exploited to carry out remote code execution (RCE) attack on the product. Please refer to the Recommended Immediate Actions for information about the mitigation/remediation. The following versions of […]CISA
- CISA Adds One Known Exploited Vulnerability to Catalog 2026-04-02CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2026-3502 TrueConf Client Download of Code Without Integrity Check Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited […]CISA
- Yokogawa CENTUM VP 2026-04-02View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to login as the PROG user and modify permissions. The following versions of Yokogawa CENTUM VP are affected: CENTUM VP >=R5.01.00| CENTUM VP >=R6.01.00| CENTUM VP vR7.01.00 (CVE-2025-7741) CVSS Vendor Equipment Vulnerabilities v3 4 Yokogawa Yokogawa CENTUM VP Use of Hard-coded Password Background […]CISA
- Siemens SICAM 8 Products 2026-04-02View CSAF Summary Multiple SICAM 8 products are affected by multiple vulnerabilities that could lead to denial of service, namely: - SICAM A8000 Device firmware - CPCI85 for CP-8031/CP-8050 - SICORE for CP-8010/CP-8012 - RTUM85 for CP-8010/CP-8012 - SICAM EGS Device firmware - CPCI85 - SICAM S8000 - SICORE - RTUM85 Siemens has released new […]CISA
- CISA Adds One Known Exploited Vulnerability to Catalog 2026-04-01CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2026-5281 Google Dawn Use-After-Free Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of […]CISA
- PX4 Autopilot 2026-03-31View CSAF Summary Successful exploitation of this vulnerability could allow an attacker with access to the MAVLink interface to execute arbitrary shell commands without cryptographic authentication. The following versions of PX4 Autopilot are affected: Autopilot v1.16.0_SITL_latest_stable (CVE-2026-1579) CVSS Vendor Equipment Vulnerabilities v3 9.8 PX4 PX4 Autopilot Missing Authentication for Critical Function Background Critical Infrastructure Sectors: […]CISA
- Anritsu Remote Spectrum Monitor 2026-03-31View CSAF Summary Successful exploitation of this vulnerability could allow attackers with network access to alter operational settings, obtain sensitive signal data, or disrupt device availability. The following versions of Anritsu Remote Spectrum Monitor are affected: Remote Spectrum Monitor MS27100A vers:all/* (CVE-2026-3356) Remote Spectrum Monitor MS27101A vers:all/* (CVE-2026-3356) Remote Spectrum Monitor MS27102A vers:all/* (CVE-2026-3356) Remote […]CISA
- CISA Adds One Known Exploited Vulnerability to Catalog 2026-03-30CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2026-3055 Citrix NetScaler Out-of-Bounds Read Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk […]CISA
- CISA Adds One Known Exploited Vulnerability to Catalog 2026-03-27CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-53521 F5 BIG-IP Remote Code Execution Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the Significant […]CISA
- CISA Adds One Known Exploited Vulnerability to Catalog 2026-03-26CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2026-33634 Aqua Security Trivy Embedded Malicious Code Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the […]CISA
ISACA SmartBrief on Cybersecurity
- Brokk faces ransomware threat from Play group 2026-04-03Brokk, a Swedish company known for its powerful demolition robots, has been targeted by the Russia-linked Play ransomware gro -More-
- Who Said It? Laughter is, after speech, the chief thing that holds society together. 2026-04-03Max Eastman or Sally Rooney Check your answer here.
- AI-driven instant software reshapes cybersecurity landscape 2026-04-03The rise of instant software created by AI is transforming cybersecurity, writes Bruce Schneier, a fellow and lecturer at the -More-
- Meta disrupts spyware campaign using fake WhatsApp app 2026-04-03Meta has disrupted a spyware campaign by Italian firm ASIGINT that used a fake WhatsApp app to gain access to sensitive data -More-
- EvilTokens kit targets Microsoft accounts via phishing 2026-04-03A malicious kit called EvilTokens is being sold on Telegram, enabling device code phishing to hijack Microsoft accounts and p -More-
- Brazilian malware campaign targets Spanish speakers 2026-04-03Threat actors from Brazil are targeting Spanish-speaking countries with a banking Trojan known as Casbaneiro, using a campaig -More-
- Ransomware attack clocks in at under an hour 2026-04-03Security researchers have observed the Akira ransomware group completing full attack cycles in under an hour, exploiting vuln -More-