CIS Security Advisories
CIS Security News
CISA News
ISACA SmartBrief
Cyber Security Advisories – MS-ISAC
- Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution 2026-03-13Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; […]
- Multiple Vulnerabilities in Mozilla Firefox Could Allow for Arbitrary Code Execution 2026-03-10Multiple vulnerabilities have been discovered in Mozilla Firefox, the most severe of which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the user an attacker […]
- Critical Patches Issued for Microsoft Products, March 10, 2026 2026-03-10Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution. Successful exploitation of the most severe of these vulnerabilities could result in an attacker gaining the same privileges as the logged-on user. Depending on the privileges associated with the user, an attacker could then install programs; […]
- Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution 2026-03-10Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution.Adobe Acrobat is a comprehensive software family designed to create, edit, manage, and sign PDF documents across desktop, web, and mobile devices.Adobe Commerce is a composable ecommerce solution that lets you quickly create global, multi-brand B2C and […]
- A Vulnerability in pac4j-jwt (JwtAuthenticator) Could Allow for Authentication Bypass 2026-03-05A vulnerability has been discovered in pac4j-jwt (JwtAuthenticator) which could allow for authentication bypass. pac4j-jwt is a Java module within the pac4j security framework designed for generating, validating, and managing JSON Web Tokens (JWT) to secure web applications and services. It supports signed and encrypted tokens, primarily using the Nimbus JOSE+JWT library to handle authentication, […]
- Multiple Vulnerabilities in Cisco Products Could Allow for Remote Code Execution 2026-03-05Multiple vulnerabilities have been discovered in Cisco products, the most severe of which could allow for remote code execution. Cisco Secure Firewall Management Center (FMC) is a centralized management platform for Cisco firewalls.Cisco Secure Firewall Adaptive Security Appliance (ASA) Software is the core operating system that powers the Cisco ASA family of firewalls.Cisco Secure Firewall Threat […]
- Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution 2026-03-04Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for remote code execution. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution. […]
- Multiple Vulnerabilities in Cisco Catalyst SD-WAN Products Could Allow for Authentication Bypass 2026-02-26Multiple vulnerabilities have been discovered in Cisco Catalyst SD-WAN products, the most severe of which could allow for authentication bypass. Cisco Catalyst SD-WAN (formerly Viptela) is a secure, cloud-delivered software-defined WAN architecture that optimizes application performance by intelligently routing traffic over any combination of transport links (MPLS, broadband, LTE). Successful exploitation of the most severe […]
- A Vulnerability in Dell RecoverPoint for Virtual Machines Could Allow for Arbitrary Code Execution 2026-02-18A vulnerability has been discovered in Dell RecoverPoint for Virtual Machines which could allow for arbitrary code execution. Dell RecoverPoint for Virtual Machines is an enterprise-grade solution for VMware Virtual Machines (VMs) enabling local, remote, and concurrent local and remote replication with continuous cyber resilience for on premises recovery to any point-in time (PiT).Successful exploitation […]
- A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution 2026-02-18A vulnerability has been discovered in Google Chrome which could allow for arbitrary code execution. Successful exploitation of the vulnerability could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create […]
Blog Feed – Center for Internet Security
- ZPHP Campaign Delivering Remcos RAT Impacting SLTTs 2026-03-17CIS CTI identified an ongoing ZPHP campaign impacting U.S. SLTTs that delivers the Remcos RAT. Find out how to defend your organization.
- What’s on My Radar for RSAC 2026: Insights from Tony Sager 2026-03-17Ahead of RSAC 2026 Conference, Tony Sager shares his thoughts about upcoming sessions and how he navigates the conference.
- 2025 Year in Review: Sustaining Cybersecurity 2026-03-16CIS sustained vital protections despite funding cuts and rising multidimensional threats. Learn more by watching our 2025 Year in Review 2025 video.
- CIS Benchmarks March 2026 Update 2026-03-06Here is an overview of the CIS Benchmarks that the Center for Internet Security (CIS) updated or released for March 2026.
- Strengthening Software Assurance Across Government Systems 2026-03-05Secure by Design ultimately supports a broader public mission: delivering trustworthy, secure, and sustainable technology that citizens can rely on.
- How to Defend Against Iran's Cyber Retaliation Playbook 2026-03-04Security leaders must give equal weight to the cyber dimension following U.S.-Israeli kinetic activity against Iran. Here's our recommendations.
- Multiply Endpoint Security's Force at Your Public Utility 2026-02-20A public utility can multiply the force of endpoint security with a 24x7x365 protection and monitoring strategy. Read our blog to learn more.
- Upholding U.S. SLTT Resilience with Affordable Services 2026-02-12The MS-ISAC bridges the U.S. SLTT resilience gap by offering under-resourced organizations access to affordable services. Read to learn more.
- CIS Benchmarks February 2026 Update 2026-02-09Here is an overview of the CIS Benchmarks that the Center for Internet Security (CIS) updated or released for February 2026.
- Top 10 Malware Q4 2025 2026-01-29Total malware notifications from MS-ISAC monitoring services increased 7% from Q3 to Q4 2025. Learn more by reading our Top 10 Malware list.
All CISA Advisories
- CISA Adds Five Known Exploited Vulnerabilities to Catalog 2026-03-20CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-31277 Apple Multiple Products Buffer Overflow Vulnerability CVE-2025-32432 Craft CMS Code Injection Vulnerability CVE-2025-43510 Apple Multiple Products Improper Locking Vulnerability CVE-2025-43520 Apple Multiple Products Classic Buffer Overflow Vulnerability CVE-2025-54068 Laravel Livewire Code Injection Vulnerability These types […]CISA
- Russian Intelligence Services Target Commercial Messaging Application Accounts 2026-03-20CISA and the Federal Bureau of Investigation released a Public Service Announcement (PSA) warning about ongoing phishing campaigns by cyber actors associated with the Russian Intelligence Services targeting commercial messaging applications (CMAs). These campaigns aim to bypass encryption to compromise to individual user accounts with targets including current and former U.S. government officials, military personnel, […]CISA
- Schneider Electric EcoStruxure PME and EPO 2026-03-19View CSAF Summary Schneider Electric is aware of a vulnerability in its EcoStruxure Power Monitoring Expert (PME) and EcoStruxure Power Operation (EPO) products. EcoStruxure Power Monitoring Expert (PME) is an on-premises software used to help power critical and energy-intensive facilities maximize uptime and operational efficiency. EcoStruxure Power Operation (EPO) are on-premises software offers that provides […]CISA
- Schneider Electric Modicon M241, M251, and M262 2026-03-19View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to cause a denial-of-service condition on the product. The following versions of Schneider Electric Modicon M241, M251, and M262 are affected: Modicon M241 versions prior to 5.4.13.12 Modicon_Controller_M241 Modicon M251 versions prior to 5.4.13.12 Modicon_Controller_M251 Modicon M262 versions prior to 5.4.10.12 Modicon_Controller_M262 CVSS […]CISA
- CTEK Chargeportal 2026-03-19View CSAF Summary Successful exploitation of these vulnerabilities could enable attackers to gain unauthorized administrative control over vulnerable charging stations or disrupt charging services through denial-of-service attacks. The following versions of CTEK Chargeportal are affected: Chargeportal vers:all/* CVSS Vendor Equipment Vulnerabilities v3 9.4 CTEK CTEK Chargeportal Missing Authentication for Critical Function, Improper Restriction of Excessive […]CISA
- IGL-Technologies eParking.fi 2026-03-19View CSAF Summary Successful exploitation of these vulnerabilities could enable attackers to gain unauthorized administrative control over vulnerable charging stations or disrupt charging services through denial-of-service attacks. The following versions of IGL-Technologies eParking.fi are affected: eParking.fi vers:all/* CVSS Vendor Equipment Vulnerabilities v3 9.4 IGL-Technologies IGL-Technologies eParking.fi Missing Authentication for Critical Function, Improper Restriction of Excessive […]CISA
- Schneider Electric Modicon Controllers M241, M251, M258, and LMC058 2026-03-19View CSAF Summary Successful exploitation of this vulnerability may risk a Cross-site Scripting or an open redirect attack which could result in an account takeover scenario or the execution of code in the user browser. The following versions of Schneider Electric Modicon Controllers M241, M251, M258, and LMC058 are affected: Modicon M241 versions prior to […]CISA
- Mitsubishi Electric CNC Series 2026-03-19View CSAF Summary Successful exploitation of this vulnerability could allow a remote attacker to cause an out-of-bounds read, resulting in a denial-of-service condition in the affected products. The following versions of Mitsubishi Electric CNC Series are affected: M800VW (BND-2051W000)CISA
- Schneider Electric EcoStruxure Automation Expert 2026-03-19View CSAF Summary Schneider Electric is aware of a vulnerability in its EcoStruxure™ Automation Expert product. The EcoStruxure™ Automation Expert product is plant automation software designed for digital control systems in discrete, hybrid and continuous industrial processes. A totally integrated automation solution designed to enhance your flexibility, efficiency and scalability. Failure to apply the remediation […]CISA
- CISA Adds One Known Exploited Vulnerability to Catalog 2026-03-19CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2026-20131 Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management Deserialization of Untrusted Data Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and poses […]CISA
ISACA SmartBrief on Cybersecurity
- Who Said It? The fight must not cease; you must see that it does not stop. 2026-03-20Susan B. Anthony or Juliette Gordon Low Check your answer here. March is Women's History Month
- Securing the AI frontier: A practical framework for assessing AI coding assistant vulnerabilities 2026-03-20AI coding assistants have become ubiquitous in software development, yet most organizations lack adequate frameworks to asses -More-
- Verizon retailer Russell Cellular hit by data breach 2026-03-20Russell Cellular, a major Verizon authorized retailer, has reportedly suffered a data breach, with over 6.3 million customer -More-
- Beast Ransomware methods exposed via open directory 2026-03-20Team Cymru has discovered an open directory linked to Beast Ransomware, revealing the group's toolkit and methods. -More-
- ConnectWise patches critical ScreenConnect vulnerability 2026-03-20ConnectWise has patched a critical cryptographic signature verification vulnerability in ScreenConnect, which could have allo -More-
- EDR killers become standard in ransomware attacks 2026-03-20EDR killers have become a staple in ransomware attacks, with tools designed to disable endpoint detection and response softwa -More-
- Report: Mobile banking in the crosshairs of malware 2026-03-20A surge in mobile banking malware is targeting financial brands across 90 countries, primarily originating from user devices, -More-
- Agency alerts companies on securing Microsoft Intune 2026-03-20The Cybersecurity and Infrastructure Security Agency has advised companies to bolster security for systems like Microsoft Int -More-