Survey Says…Scam!
The NJCCIC observed a phishing campaign that impersonates several brands, claiming to be invitations to a feedback survey with an exclusive prize for completing it. These phishing emails contain links that use URL shorteners to obfuscate the true malicious destinations, and have subjects such as: Marriott Luxury Pillows 2-piece set from Marriott Car emergency kit …
Continue reading Survey Says…Scam!Thu, 15 Jan 2026 20:01:12 +0000
The Great Remote Job Rip-Off
Threat actors continue to impersonate recruiters and employers to target potential job seekers with fake or unrealistic remote job offers. They often send unsolicited emails or text messages that promise high pay for little work, require payment to get a job or training, lure targets with bad checks to buy fake work equipment or supplies, …
Continue reading The Great Remote Job Rip-OffThu, 15 Jan 2026 19:59:21 +0000
Webinar on 1/23 | Introduction to Draft NIST IR 8587
Public Webinar: NIST IR 8587, Protecting Tokens and Assertions from Forgery, Theft, and Misuse (Initial Public Draft) Date: January 23, 2026Time: 12:00 – 1:00 PM ET This free live webinar, hosted by the NIST and the Cybersecurity and Infrastructure Security Agency (CISA), introduces the recently released initial public draft of NIST Interagency Report 8587, “Protecting …
Continue reading Webinar on 1/23 | Introduction to Draft NIST IR 8587Thu, 15 Jan 2026 19:53:55 +0000
Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution – PATCH: NOW
Multiple vulnerabilities have been discovered in Mozilla products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create …
Continue reading Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution – PATCH: NOWThu, 15 Jan 2026 19:53:02 +0000
Critical Patches Issued for Microsoft Products, January 13, 2026 – PATCH NOW
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution. Successful exploitation of the most severe of these vulnerabilities could result in an attacker gaining the same privileges as the logged-on user. Depending on the privileges associated with the user, an attacker could then install programs; …
Continue reading Critical Patches Issued for Microsoft Products, January 13, 2026 – PATCH NOWThu, 15 Jan 2026 19:52:02 +0000
Multiple Vulnerabilities in Fortinet Products Could Allow for Arbitrary Code Execution – PATCH NOW
Multiple vulnerabilities have been discovered in Fortinet products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the affected service account. Depending on the privileges associated with the service account an attacker could then …
Continue reading Multiple Vulnerabilities in Fortinet Products Could Allow for Arbitrary Code Execution – PATCH NOWThu, 15 Jan 2026 19:51:23 +0000
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution – PATCH NOW
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; …
Continue reading Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution – PATCH NOWThu, 15 Jan 2026 19:50:40 +0000
Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution – PATCH: NOW
Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install …
Continue reading Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution – PATCH: NOWThu, 15 Jan 2026 19:49:04 +0000
Guidance on Secure Connectivity Principles for Operational Technology
The Cybersecurity and Infrastructure Security Agency (CISA) and the UK National Cyber Security Centre, in collaboration with other federal and international partners, have released Secure Connectivity Principles for Operational Technology guidance to help asset owners address increasing business and regulatory pressures for connectivity into operational technology networks. Operational technology (OT) environments – which have long been centered …
Continue reading Guidance on Secure Connectivity Principles for Operational TechnologyThu, 15 Jan 2026 19:48:14 +0000
Upcoming NIST Webinar: Resources for Ransomware Risk Management
Date: January 28, 2026 Time: 2:00-3:00PM ET Ransomware is a persistent risk to organizations of all sizes and sectors, and addressing this risk requires collaboration across the public and private sectors to develop practical resources for organizations to reduce their ransomware risks. Speakers from the National Institute of Standards and Technology (NIST), the Center for …
Continue reading Upcoming NIST Webinar: Resources for Ransomware Risk ManagementThu, 15 Jan 2026 19:47:18 +0000