BLOG

Survey Says…Scam!

The NJCCIC observed a phishing campaign that impersonates several brands, claiming to be invitations to a feedback survey with an exclusive prize for completing it. These phishing emails contain links that use URL shorteners to obfuscate the true malicious destinations, and have subjects such as: Marriott Luxury Pillows 2-piece set from Marriott Car emergency kit … Continue reading Survey Says…Scam!
Thu, 15 Jan 2026 20:01:12 +0000

The Great Remote Job Rip-Off

Threat actors continue to impersonate recruiters and employers to target potential job seekers with fake or unrealistic remote job offers. They often send unsolicited emails or text messages that promise high pay for little work, require payment to get a job or training, lure targets with bad checks to buy fake work equipment or supplies, … Continue reading The Great Remote Job Rip-Off
Thu, 15 Jan 2026 19:59:21 +0000

Webinar on 1/23 | Introduction to Draft NIST IR 8587

Public Webinar: NIST IR 8587, Protecting Tokens and Assertions from Forgery, Theft, and Misuse (Initial Public Draft) Date: January 23, 2026Time: 12:00 – 1:00 PM ET This free live webinar, hosted by the NIST and the Cybersecurity and Infrastructure Security Agency (CISA), introduces the recently released initial public draft of NIST Interagency Report 8587, “Protecting … Continue reading Webinar on 1/23 | Introduction to Draft NIST IR 8587
Thu, 15 Jan 2026 19:53:55 +0000

Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution – PATCH: NOW

Multiple vulnerabilities have been discovered in Mozilla products, the most severe of which could allow for arbitrary code execution.  Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create … Continue reading Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution – PATCH: NOW
Thu, 15 Jan 2026 19:53:02 +0000

Critical Patches Issued for Microsoft Products, January 13, 2026 – PATCH NOW

Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution. Successful exploitation of the most severe of these vulnerabilities could result in an attacker gaining the same privileges as the logged-on user. Depending on the privileges associated with the user, an attacker could then install programs; … Continue reading Critical Patches Issued for Microsoft Products, January 13, 2026 – PATCH NOW
Thu, 15 Jan 2026 19:52:02 +0000

Multiple Vulnerabilities in Fortinet Products Could Allow for Arbitrary Code Execution – PATCH NOW

Multiple vulnerabilities have been discovered in Fortinet products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the affected service account. Depending on the privileges associated with the service account an attacker could then … Continue reading Multiple Vulnerabilities in Fortinet Products Could Allow for Arbitrary Code Execution – PATCH NOW
Thu, 15 Jan 2026 19:51:23 +0000

Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution – PATCH NOW

Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; … Continue reading Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution – PATCH NOW
Thu, 15 Jan 2026 19:50:40 +0000

Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution – PATCH: NOW

Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install … Continue reading Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution – PATCH: NOW
Thu, 15 Jan 2026 19:49:04 +0000

Guidance on Secure Connectivity Principles for Operational Technology

The Cybersecurity and Infrastructure Security Agency (CISA) and the UK National Cyber Security Centre, in collaboration with other federal and international partners, have released Secure Connectivity Principles for Operational Technology guidance to help asset owners address increasing business and regulatory pressures for connectivity into operational technology networks. Operational technology (OT) environments – which have long been centered … Continue reading Guidance on Secure Connectivity Principles for Operational Technology
Thu, 15 Jan 2026 19:48:14 +0000

Upcoming NIST Webinar: Resources for Ransomware Risk Management

Date: January 28, 2026 Time: 2:00-3:00PM ET Ransomware is a persistent risk to organizations of all sizes and sectors, and addressing this risk requires collaboration across the public and private sectors to develop practical resources for organizations to reduce their ransomware risks. Speakers from the National Institute of Standards and Technology (NIST), the Center for … Continue reading Upcoming NIST Webinar: Resources for Ransomware Risk Management
Thu, 15 Jan 2026 19:47:18 +0000