Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter by Topic
582 Results Found
161 - 170 of 582 results
Published on 09.30.2022
Top 10 Malware August 2022In MS-ISAC's Top 10 Malware list for August 2022, LingyunNET, RecordBreaker, and TeamSpy first appeared, while SocGholish and Tinba returned.
Published on 09.26.2022
Cybersecurity at Scale: Piercing the Fog of MoreTo pierce the Fog of More, organizations must implement essential cyber hygiene and track their implementation of security best practices.
Published on 09.22.2022
SATAn Targets Air-Gapped Computers with Data Theft, SpyingMalicious actors can use a "SATAn" attack involving the SATA interface to target air-gapped computers with data theft and extortion.
Published on 09.19.2022
Three Ways that Security in the Azure Cloud Just Got SimplerIn ongoing partnership with Microsoft Azure, CIS has released two CIS Benchmarks, one updated and one new, for Microsoft Azure.
Published on 09.14.2022
How to Scale Cybersecurity for Your BusinessTo scale their cybersecurity programs, organizations should deploy layered security solutions such as those included in a CIS SecureSuite Members...
Published on 09.14.2022
ISACs' Possible Role in Software Supply Chain AssuranceCurrently, there are two main roles that ISACs can serve in the software supply chain assurance process. Let's examine both.
Published on 09.13.2022
LockBit 3.0 RaaS Gang Incorporates BlackMatter CapabilitiesThe LockBit 3.0 Ransomware as a Service (RaaS) gang has incorporated capabilities of the BlackMatter group into its operations.
Published on 09.12.2022
Navigating Today’s Security Challenges at InfoSec World 2022CIS is excited to sponsor and attend InfoSec World 2022 at Disney’s Coronado Springs Resort in Lake Buena Vista, Florida.
Published on 09.08.2022
Killnet Group Targeting Ukraine Supporters with DDoS AttacksThe Russian-Ukraine war has motivated APT groups to capitalize on the conflict and take sides. Such is true of Killnet.
Published on 09.06.2022
Surge of QakBot Activity Using Malspam, Malicious XLSB FilesThe MS-ISAC is observing an uptick in SLTT QakBot activity aligned with open-source reporting. Let's examine one of those campaigns.
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More