CIS Security Advisories
CIS Security News
CISA News
ISACA SmartBrief
Cyber Security Advisories – MS-ISAC
- Critical Patches Issued for Microsoft Products, April 14, 2026 2026-04-14Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution. Successful exploitation of the most severe of these vulnerabilities could result in an attacker gaining the same privileges as the logged-on user. Depending on the privileges associated with the user, an attacker could then install programs; […]
- Multiple Vulnerabilities in Fortinet Products Could Allow for Arbitrary Code Execution 2026-04-14Multiple vulnerabilities have been discovered in Fortinet products, the most severe of which could allow for arbitrary code execution.FortiAnalyzer is a unified security operations platform that consolidates telemetry across networks, endpoints, and cloud environments.FortiClientEMS is a centralized management platform for deploying, configuring, monitoring, and enforcing security policies across numerous endpoints (computers) running the FortiClient agent.FortiDDoS […]
- Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution 2026-04-14Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution.Adobe Acrobat Reader is a free, widely used software application from Adobe that allows users to view, print, sign, share, and annotate PDF documents.Adobe InDesign is desktop publishing software used to create, pre-flight, and publish professional page […]
- Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution 2026-04-07Multiple vulnerabilities have been discovered in Mozilla products, the most severe of which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet.Mozilla Firefox ESR is a version of the web browser intended to be deployed in large organizations.Mozilla Thunderbird is an email client.Mozilla Thunderbird ESR is a version […]
- A Vulnerability in Fortinet FortiClientEMS Could Allow for Arbitrary Code Execution 2026-04-04A Vulnerability has been discovered in Fortinet FortiClientEMS that could allow for arbitrary code execution. FortiClientEMS is a centralized management platform for deploying, configuring, monitoring, and enforcing security policies across numerous endpoints (computers) running the FortiClient agent.Successful exploitation of this vulnerability could allow for arbitrary code execution in the context of the affected service account. Depending on […]
- Multiple Vulnerabilities in Progress ShareFile Could Allow for Remote Code Execution 2026-04-02Multiple vulnerabilities have been discovered in Progress ShareFile, which when chained together, could allow for remote code execution. Progress ShareFile is a secure, cloud-based content collaboration and file-sharing platform. It enables businesses to securely exchange documents, manage client workflows, and obtain electronic signatures, with a focus on compliance for industries like finance and healthcare. Successful […]
- Multiple Vulnerabilities in Cisco Products Could Allow for Arbitrary Code Execution 2026-04-02Multiple vulnerabilities have been discovered in Cisco products, the most severe of which could allow for arbitrary code execution. Cisco Smart Software Manager On‑Prem is a centralized Cisco tool used by organizations to manage software licenses, entitlements, and compliance for Cisco products within their own network environment.Cisco Integrated Management Controller (IMC) is embedded server management software […]
- Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution 2026-04-02Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; […]
- Multiple Vulnerabilities in Apple Products Could Allow for Privilege Escalation 2026-04-01Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for privilege escalation. Successful exploitation of the most severe of these vulnerabilities could allow a user to elevate privileges. Depending on the privileges associated with the user, they may be able to modify protected system files.
- A Vulnerability in F5 Products Could Allow for Remote Code Execution 2026-03-30A vulnerability has been discovered in F5 Products that could allow for remote code execution. F5 BIG IP APM is an access policy management solution designed to enforce secure access to applications, APIs, and sensitive data. It is commonly deployed by enterprises, financial institutions, and government or public sector organizations to centrally control authentication, authorization, […]
Blog Feed – Center for Internet Security
- From Community to Cloud: How CIS Hardened Images Turn Best Practices into Secure Deployment 2026-04-14CIS Benchmarks and CIS Hardened Images enable secure cloud deployment, reduce misconfigurations, and enforce consistent security baselines.
- MacSync Stealer Campaign Impacting U.S. SLTT macOS Users 2026-04-13An ongoing MacSync Stealer campaign is targeting macOS users in U.S. SLTT government organizations. Learn more by reading CIS CTI's analysis.
- Vimeo-Themed Phishing Campaign Targeting Personal and Banking Data 2026-04-06CIS CTI has identified an ongoing Vimeo-themed phishing campaign impacting U.S. SLTTs. Read the team's analysis to learn how to stay safe.
- IRS-Themed Phishing Granting Threat Actors Remote Access 2026-03-24The CIS CTI team spotted an ongoing campaign targeting SLTT government entities with tax- and IRS-themed phishing lures. Take a closer look.
- ZPHP Campaign Delivering Remcos RAT Impacting SLTTs 2026-03-17CIS CTI identified an ongoing ZPHP campaign impacting U.S. SLTTs that delivers the Remcos RAT. Find out how to defend your organization.
- What’s on My Radar for RSAC 2026: Insights from Tony Sager 2026-03-17Ahead of RSAC 2026 Conference, Tony Sager shares his thoughts about upcoming sessions and how he navigates the conference.
- 2025 Year in Review: Sustaining Cybersecurity 2026-03-16CIS sustained vital protections despite funding cuts and rising multidimensional threats. Learn more by watching our 2025 Year in Review 2025 video.
- CIS Benchmarks March 2026 Update 2026-03-06Here is an overview of the CIS Benchmarks that the Center for Internet Security (CIS) updated or released for March 2026.
- Strengthening Software Assurance Across Government Systems 2026-03-05Secure by Design ultimately supports a broader public mission: delivering trustworthy, secure, and sustainable technology that citizens can rely on.
- How to Defend Against Iran's Cyber Retaliation Playbook 2026-03-04Security leaders must give equal weight to the cyber dimension following U.S.-Israeli kinetic activity against Iran. Here's our recommendations.
All CISA Advisories
- CISA Adds One Known Exploited Vulnerability to Catalog 2026-04-16CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2026-34197 Apache ActiveMQ Improper Input Validation Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the Significant […]CISA
- Anviz Multiple Products 2026-04-16View CSAF Summary Successful exploitation of these vulnerabilities could allow attackers to conduct reconnaissance, capture or decrypt sensitive data, alter device configurations, gain unauthorized administrative or root‑level access, execute arbitrary code, compromise credentials or communications, and ultimately obtain full control over affected devices. The following versions of Anviz Multiple Products are affected: CX2 Lite Firmware […]CISA
- Delta Electronics ASDA-Soft 2026-04-16View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code. The following versions of Delta Electronics ASDA-Soft are affected: ASDA-SoftCISA
- Horner Automation Cscape and XL4, XL7 PLC 2026-04-16View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to gain unauthorized access to systems and services. The following versions of Horner Automation Cscape and XL4, XL7 PLC are affected: Cscape v10.0 XL7 PLC v15.60 XL4 PLC v16.32.0 CVSS Vendor Equipment Vulnerabilities v3 9.1 Horner Automation Horner Automation Cscape and XL4, XL7 […]CISA
- AVEVA Pipeline Simulation 2026-04-16View CSAF Summary Successful exploitation of this vulnerability could allow an unauthenticated attacker to modify simulation parameters, training configuration and training records. The following versions of AVEVA Pipeline Simulation are affected: Pipeline SimulationCISA
- CISA Adds Two Known Exploited Vulnerabilities to Catalog 2026-04-14CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2009-0238 Microsoft Office Remote Code Execution Vulnerability CVE-2026-32201 Microsoft SharePoint Server Improper Input Validation Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Binding […]CISA
- CISA Adds Seven Known Exploited Vulnerabilities to Catalog 2026-04-13CISA has added seven new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2012-1854 Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability CVE-2020-9715 Adobe Acrobat Use-After-Free Vulnerability CVE-2023-21529 Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability CVE-2023-36424 Microsoft Windows Out-of-Bounds Read Vulnerability CVE-2025-60710 Microsoft Windows Link Following Vulnerability […]CISA
- Contemporary Controls BASC 20T 2026-04-09View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to enumerate the functionality of each component associated with the PLC, reconfigure, rename, delete, perform file transfers, and make remote procedure calls. The following versions of Contemporary Controls BASC 20T are affected: BASControl20 3.1 (CVE-2025-13926) CVSS Vendor Equipment Vulnerabilities v3 9.8 Contemporary Controls […]CISA
- GPL Odorizers GPL750 2026-04-09View CSAF Summary Successful exploitation of this vulnerability could allow a low privileged remote attacker to manipulate register values, which would result in too much or too little odorant being injected into a gas line. The following versions of GPL Odorizers GPL750 are affected: GPL750 (XL4) >=v1.0| GPL750 (XL4 Prime) >=v4.0| GPL750 (XL7) >=v13.0| GPL750 […]CISA
- CISA Adds One Known Exploited Vulnerability to Catalog 2026-04-08CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2026-1340 Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing […]CISA
ISACA SmartBrief on Cybersecurity
- Who Said It? Today, there's more past than yesterday. But is there any less future? 2026-04-17Elisa Gabbert or Rita Dove Check your answer here.
- Kemper investigates claim of 13M records leaked by hackers 2026-04-17Kemper is investigating a claim by hacker group ShinyHunters that more than 13 million records have been leaked on the dark w -More-
- ISACA 2026 North American Conference Timer 2026-04-17
- CISO reporting line debate highlights leadership gap 2026-04-17Who should the chief information security officer report to? -More-
- Report: Ransomware "most disruptive" threat to auto sector 2026-04-17Ransomware has grown fast as a threat to the automotive industry, making up 44% of cyberattacks on carmakers last year, accor -More-
- Q-Day is coming: Continuous risk management is key 2026-04-17With quantum computers posing a threat to modern encryption standards, Jean-Philippe Aumasson, a cryptography expert and co-f -More-
- AI-powered vishing platform automates credential theft 2026-04-17A cybercrime platform called ATHR is using AI voice agents to automate voice phishing attacks, targeting services like Google -More-
- NIST introduces new criteria for vulnerability analysis 2026-04-17The National Institute of Standards and Technology is changing its approach to analyzing cybersecurity vulnerabilities due to -More-