BLOG

Vulnerability in GrafanaCould Allow for Arbitrary Code Execution

A vulnerability exists in Grafana which could result in arbitrary code execution. Grafana is an open-source platform used for visualizing and analyzing time series data. It allows users to connect to various data sources, query and transform data, and create interactive dashboards to monitor and explore metrics, logs, and traces. Successful exploitation could allow threat … Continue reading Vulnerability in GrafanaCould Allow for Arbitrary Code Execution
Wed, 18 Jun 2025 20:00:50 +0000

Astaroth’s Hidden LNK

Image Source: Proofpoint The NJCCIC’s email security solution observed an uptick in campaigns spreading Astaroth malware from TA2725 . Astaroth, first spotted in 2017, is an information-stealing trojan that primarily targets businesses in Brazil, Europe, and other countries throughout Latin America. Recently observed phishing emails from TA275 contain Portuguese lures masquerading as curriculum vitae (CV), … Continue reading Astaroth’s Hidden LNK
Thu, 12 Jun 2025 18:18:42 +0000

Weaponized SVG Phishing Campaigns

Scalable Vector Graphics (SVG) image files are commonly used for legitimate web graphics and marketing purposes. Unlike JPEG or PNG files, SVG files are written in XML and support JavaScript and HTML code. They can contain scripts, hyperlinks, and interactive elements, which can be exploited by embedding malicious code within harmless SVG files. Although this … Continue reading Weaponized SVG Phishing Campaigns
Thu, 12 Jun 2025 18:13:54 +0000

NIST Publishes Final Special Publication 1800-35, Implementing a Zero Trust Architecture

The NIST National Cybersecurity Center of Excellence (NCCoE) has released the final practice guide, Implementing a Zero Trust Architecture (NIST SP 1800-35). This publication outlines results and best practices from the NCCoE effort featuring work with 24 vendors to demonstrate end-to-end Zero Trust Architectures. As an enterprise’s data and resources have become distributed across on-premises … Continue reading NIST Publishes Final Special Publication 1800-35, Implementing a Zero Trust Architecture
Wed, 11 Jun 2025 14:14:39 +0000

Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution – PATCH: NOW

Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install … Continue reading Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution – PATCH: NOW
Tue, 10 Jun 2025 19:08:26 +0000

Critical Patches Issued for Microsoft Products, June 10, 2025 – PATCH: NOW

Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users … Continue reading Critical Patches Issued for Microsoft Products, June 10, 2025 – PATCH: NOW
Tue, 10 Jun 2025 18:35:46 +0000

Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution – PATCH: NOW

Multiple vulnerabilities have been discovered in Mozilla Firefox, the most severe of which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the user an attacker … Continue reading Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution – PATCH: NOW
Tue, 10 Jun 2025 18:26:54 +0000

Primary Mitigations to Reduce Cyber Threats to Operational Technology

The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Environmental Protection Agency (EPA), and the Department of Energy (DOE)—hereafter referred to as “the authoring organizations”—are aware of cyber incidents affecting the operational technology (OT) and industrial control systems (ICS) of critical infrastructure entities in the United States. The authoring organizations … Continue reading Primary Mitigations to Reduce Cyber Threats to Operational Technology
Tue, 10 Jun 2025 16:10:44 +0000

Cybercriminals Impersonate NJ MVC in Recent SMS Text Phishing Messages

Over the last week, the NJCCIC has received several incident reports from NJ residents regarding an SMS text phishing (SMiShing) scam impersonating the Department of Motor Vehicles (DMV). These messages claim that the user has an outstanding traffic ticket and payment is due. If not paid by May 29, the user will have their vehicle … Continue reading Cybercriminals Impersonate NJ MVC in Recent SMS Text Phishing Messages
Tue, 10 Jun 2025 16:09:39 +0000

Intuit Credential Phishing

The NJCCIC’s email security solution observed a new phishing campaign targeting Intuit login credentials. In this campaign, threat actors send an email impersonating accounting software Intuit QuickBooks. While the spoofed email address may appear to come from Intuit at first glance, the domain used in this campaign is intuit[.]net, which is not an official Intuit … Continue reading Intuit Credential Phishing
Tue, 10 Jun 2025 16:04:49 +0000