www.cyber.nj.gov Open in urlscan Pro
45.60.124.188  Public Scan

Submitted URL: http://cyber.nj.gov/
Effective URL: https://www.cyber.nj.gov/
Submission: On March 29 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Please enable JavaScript in your browser for a better user experience.


NJ's Current Cyber Alert Level: "GUARDED". More . . .

Hide banner
Skip to Main Content
Home NJCCIC Menu
OFFICIAL SITE OF THE STATE OF NEW JERSEYGovernor Phil Murphy • Lt. Governor
Tahesha Way
Report Careers Portal Login Membership
Search Go
I WANT TO...


HOW DO I...

Category 1 Select Apply Contact Log In Report Request Sign Up View


APPLY...

REQUESt… For a Cybersecurity GrantFor an NJCCIC Internship


FOR A CYBERSECURITY GRANT



LEARN MORE

Learn More aboutFor a Cybersecurity Grant

CLOSE FINDER
I WANT TO...
 * Home NJCCIC
 * Report
    * Incident Reporting
      * Report a Cybersecurity Incident
      * Report a Data Breach
      * How To File a Report
   
    * Vulnerability Disclosure
      * Report a Vulnerability
      * Vulnerability Disclosure Policy
      * Acknowledgements

 * Guidance and Best Practices
    * Account Security
      * Multi-Factor Authentication
      * Credential Stuffing
      * Google
      * Encryption: The Basics
      * Passwords, Passwords, Passwords
    * Cyber Hygiene
      * Cybersecurity for Small & Medium-Sized Businesses
      * Glossary
      * Cybersecurity Glossary
      * Cyber Tip Tuesday: Importance of Digital Spring Cleaning and Practical
        Tips
      * Back-to-School Cybersecurity
      * Backups: The Cure to Viral Cyber Infections
      * Stay Cyber Safe This Holiday Season
      * Applying Standards
      * Cyber Safe Travel Tips
      * How Big is Your Footprint?
      * Information Asset Management
   
    * Device Security
      * Securing All Your Shiny New Connected Devices
      * The Nefarious Use of Bluetooth Tracking Devices
      * IoT Device Security and Privacy
      * Guide to Accessing Your Android Device’s Security & Privacy Settings
      * Mobile Device Security
      * User Beware: Your Smartphone Is Tracking Your Every Move
    * Email Security
      * Compromised Email Accounts
      * Phishing and Other Social Engineering Attacks
      * Sender Policy Framework - SPF Guide
      * Spotting a Spoofing
    * Identity Theft & Privacy
      * Privacy and Security Concerns of Software and Services
      * Data Breach Prevention
      * Identity Theft and Compromised PII
      * Freezing Your Credit
      * Data Privacy
   
    * Artificial Intelligence
      * Is Seeing Believing? A Look into Deepfakes
      * Seeing AI to AI: Artificial Intelligence and its Impact on Cybersecurity
    * Internet Safety
      * Keeping Children Safe Online
      * Magecart Attacks
      * Malvertising: More than a Nuisance
    * Physical Security
    * Social Media Security
      * Guide to Accessing TikTok’s Security & Privacy Settings
      * Guide to Accessing Facebook’s Security & Privacy Settings
      * Guide to Accessing Instagram’s Security & Privacy Settings
      * Guide to Accessing Twitter’s Security & Privacy Settings
      * Social Media: Sharing More Than What You Post
    * Telecommuting
      * Tips for Teleworkers, Remote Access Security
   
    * Resources for Businesses & Government
      * Don't Be Fooled: Ways to Prevent BEC Victimization
      * Insider Threats
      * Supply Chain Security
    * Wi-Fi & Network Security
      * Configuring & Securing a Home Wi-Fi Router
      * Network Segmentation
      * Virtual Private Networks

 * Grants and Resources
    * Grants
      * Safe Drinking Water Cybersecurity Grant Program (SDWCGP)
      * State and Local Cybersecurity Grant Program (SLCGP)
    * Forms
      * Exception Request Form
   
    * State Resources
      * Statewide Information Security Manual (SISM)
      * NJCCIC Strategic Plan
      * NJ State Prohibited Products
      * Election Security
      * Cybersecurity Program Controls Assessment (CPCA)
   
    * Templates
      * Policy Templates
   
    * Trainings and Certifications

 * Threat Landscape
    * Latest Alerts and Advisories
    * Public Data Breaches
    * Malware
      * ATM Malware
      * Spyware
      * Botnets
      * Cryptocurrency-Mining Malware
      * Exploit Kits
      * Industrial Control Systems (ICS) Malware
      * MacOS Malware
      * Mobile Malware
      * Point-of-Sale (POS) Malware
      * Trojans
   
    * Ransomware
      * Ransomware: The Current Threat Landscape
      * Ransomware: Risk Mitigation Strategies
      * Ransomware Remains a Pervasive Threat — What Have We Learned?
      * Ransomware Remains Prominent Threat
      * Ransomware Variants
    * DDOS Attacks
      * DDOS Attack Types and Mitigation Strategies
      * Threat Actors Ride the Extortion Waves of RDDOS Attacks
      * Defending Against DDOS Attacks
   
    * Phishing & Online Scams
      * Phishing Awareness
      * Business Email Compromise (BEC)
      * Cryptocurrency Scams
      * Financial Payment Scams
      * Telephone Scams
      * Gift Card Scams
      * Malvertising
      * Impersonation Scams
      * Romance Scams
      * Job Scams
      * SMS Scams
      * Social Media Scams
      * Tax Scams
   
    * Cybersecurity for Critical Infrastructure
      * Education
      * Colonial Pipeline Incident: Ransomware Impacts and Mitigation Strategies
      * Ransomware Attacks Continue to Target Education Sector
      * Food and Agriculture
      * Transportation
      * Water and Wastewater
      * Healthcare and Public Health
    * Vulnerabilities
      * CISA's Known Exploited Vulnerabilities Catalog
      * Apache Log4j Vulnerability Guidance

 * Connect
    * About the NJCCIC
    * Online Learning
      * E-Learning for Students
      * Partner Resources
      * Video-Based Learning
    * NJCCIC Membership
      * Become a Member
   
    * Careers
      * Internships
      * Women in Cybersecurity
    * Member Portal Login
    * Cyber Blog
   
    * Events
      * CyberStart America (CSA)
      * Cybersecurity Awareness Month (CAM)
      * Alice in Cyberspace
      * Cyber Resilience Symposium
      * Jersey CTF
    * Cybersecurity Education in New Jersey
   
    * Weekly Bulletin
    * Outreach Presentations
      * Request a Presentation
    * Contact Us


BEWARE OF AI TAX SCAMS

Threat actors are using AI-generated deepfakes and voice cloning to impersonate
trusted tax authorities.

Learn More


AZORULT MALWARE DISTRIBUTED VIA HTML SMUGGLING

HTML smuggling and fraudulent Google Sites pages are disseminating AZORult in a
new malware campaign.

Learn More
 * Go to slide 1
 * Go to slide 2




ALERTS & ADVISORIES




NJCCIC MEMBERSHIP




WEEKLY BULLETIN




OUTREACH PRESENTATIONS




CYBER BEST PRACTICES




REPORT A CYBERSECURITY INCIDENT

REPORT NOW
Previous


SPOTLIGHT

Cybersecurity for Critical Infrastructure

Cybersecurity for critical infrastructure is crucial as cyberattacks threaten
the confidentiality, integrity, availability, and privacy of information and
information systems. Recent events and evolving threats highlight the risks
critical infrastructure sectors face, reinforcing the need for preparedness and
resiliency plans to ensure risk management, business continuity, disaster
recovery, and incident response.

Learn More


SPOTLIGHT

Internships at the NJCCIC

The NJCCIC offers internships to college and high school students throughout the
year. Our internship program is a paid opportunity open to students from a wide
variety of academic disciplines and allows interns to explore the exciting field
of cybersecurity. Interns receive an unparalleled opportunity to contribute to
ongoing NJCCIC projects and gain relevant work experience for their future
careers.

Learn More


SPOTLIGHT

Cybersecurity Policy Templates

As cyber threats become increasingly sophisticated, it is critical that
organizations implement layered security frameworks to protect their data and
infrastructure. Jumpstart the process by using these templates to establish
policies that formalize security controls as ongoing processes.

Learn More
Next


MEMBERSHIP


WHAT YOU GET FROM JOINING

An NJCCIC membership enables you to increase your cybersecurity knowledge and
threat awareness. Join today at no cost, and we’ll deliver the latest cyber
alerts and vulnerability advisories to your inbox, along with our weekly
bulletins, training notifications, and other cybersecurity updates.

JOIN NOW

0

Staff Members

0

NJCCIC Members

0

States Represented

0

Countries Represented


PUBLICATIONS

Previous

AZORult Malware Distributed HTML Smuggling



Beware of AI Tax Scams



Third-Party Vendor Security



Malicious Copycat Applications Found in Apple App Store



Sophisticated Phishing Scheme Impersonates FCC & Cryptocurrency Platforms



Hugging Face AI Platform’s Problem with Malicious AI



Change Healthcare Ransomware Attack Highlights Far Reaching Impacts of Cyber
Incidents



AI and the Spread of Misinformation



Phishing Scheme Targets School Staff and Students



Beware of Active Subdomain Hijacking Operation



Beware of Tax Scams



Recent Cyberattacks Impact Financial Services Sector



Custom Apex Code Could Lead to Security Vulnerabilities in Salesforce Instances



The Current Threat Landscape of Healthcare



Be Wary of QR Code Fatigue



Schemes Using Deepfake Technology on the Rise



Increase in SEO Poisoning and Malvertising



Sextortion and Romance Scams: Dodging Cupid’s Malicious Arrow



The Aftermath of a SIM Swapping Attack



Uptick in Compromised Accounts



FBI Warns of New Tech Support Scam Targeting Senior Citizens



Protecting Your Data From Getting Into the Wrong Hands



Unknown Database Exposes 26 Billion Records



Volt Typhoon Targets Legacy Cisco Routers in New Campaign



Threat Actors Exploit Common HR Themes in Phishing Campaigns



Ivanti Connect Secure Zero-Days Actively Exploited



Raptor Technologies



Data Privacy Week: Take Control of Your Data



SMTP Smuggling Could Allow Spoofed Emails



Evolving Extortion Tactics in Ransomware Attacks



Cloud Misconfigurations Pose Risk for Data Exfiltration and Cyberattacks



Increase in Cryptocurrency Scams



Next
VIEW ALL PUBLICATIONS
2 Schwarzkopf Dr. Ewing Township, NJ 08628 njccic@cyber.nj.gov

WEBSITE DESIGN BY Granicus - Connecting People and Government

Loading ...