www.cyber.nj.gov
Open in
urlscan Pro
45.60.124.188
Public Scan
Submitted URL: http://cyber.nj.gov/
Effective URL: https://www.cyber.nj.gov/
Submission: On March 29 via api from US — Scanned from DE
Effective URL: https://www.cyber.nj.gov/
Submission: On March 29 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Please enable JavaScript in your browser for a better user experience. NJ's Current Cyber Alert Level: "GUARDED". More . . . Hide banner Skip to Main Content Home NJCCIC Menu OFFICIAL SITE OF THE STATE OF NEW JERSEYGovernor Phil Murphy • Lt. Governor Tahesha Way Report Careers Portal Login Membership Search Go I WANT TO... HOW DO I... Category 1 Select Apply Contact Log In Report Request Sign Up View APPLY... REQUESt… For a Cybersecurity GrantFor an NJCCIC Internship FOR A CYBERSECURITY GRANT LEARN MORE Learn More aboutFor a Cybersecurity Grant CLOSE FINDER I WANT TO... * Home NJCCIC * Report * Incident Reporting * Report a Cybersecurity Incident * Report a Data Breach * How To File a Report * Vulnerability Disclosure * Report a Vulnerability * Vulnerability Disclosure Policy * Acknowledgements * Guidance and Best Practices * Account Security * Multi-Factor Authentication * Credential Stuffing * Google * Encryption: The Basics * Passwords, Passwords, Passwords * Cyber Hygiene * Cybersecurity for Small & Medium-Sized Businesses * Glossary * Cybersecurity Glossary * Cyber Tip Tuesday: Importance of Digital Spring Cleaning and Practical Tips * Back-to-School Cybersecurity * Backups: The Cure to Viral Cyber Infections * Stay Cyber Safe This Holiday Season * Applying Standards * Cyber Safe Travel Tips * How Big is Your Footprint? * Information Asset Management * Device Security * Securing All Your Shiny New Connected Devices * The Nefarious Use of Bluetooth Tracking Devices * IoT Device Security and Privacy * Guide to Accessing Your Android Device’s Security & Privacy Settings * Mobile Device Security * User Beware: Your Smartphone Is Tracking Your Every Move * Email Security * Compromised Email Accounts * Phishing and Other Social Engineering Attacks * Sender Policy Framework - SPF Guide * Spotting a Spoofing * Identity Theft & Privacy * Privacy and Security Concerns of Software and Services * Data Breach Prevention * Identity Theft and Compromised PII * Freezing Your Credit * Data Privacy * Artificial Intelligence * Is Seeing Believing? A Look into Deepfakes * Seeing AI to AI: Artificial Intelligence and its Impact on Cybersecurity * Internet Safety * Keeping Children Safe Online * Magecart Attacks * Malvertising: More than a Nuisance * Physical Security * Social Media Security * Guide to Accessing TikTok’s Security & Privacy Settings * Guide to Accessing Facebook’s Security & Privacy Settings * Guide to Accessing Instagram’s Security & Privacy Settings * Guide to Accessing Twitter’s Security & Privacy Settings * Social Media: Sharing More Than What You Post * Telecommuting * Tips for Teleworkers, Remote Access Security * Resources for Businesses & Government * Don't Be Fooled: Ways to Prevent BEC Victimization * Insider Threats * Supply Chain Security * Wi-Fi & Network Security * Configuring & Securing a Home Wi-Fi Router * Network Segmentation * Virtual Private Networks * Grants and Resources * Grants * Safe Drinking Water Cybersecurity Grant Program (SDWCGP) * State and Local Cybersecurity Grant Program (SLCGP) * Forms * Exception Request Form * State Resources * Statewide Information Security Manual (SISM) * NJCCIC Strategic Plan * NJ State Prohibited Products * Election Security * Cybersecurity Program Controls Assessment (CPCA) * Templates * Policy Templates * Trainings and Certifications * Threat Landscape * Latest Alerts and Advisories * Public Data Breaches * Malware * ATM Malware * Spyware * Botnets * Cryptocurrency-Mining Malware * Exploit Kits * Industrial Control Systems (ICS) Malware * MacOS Malware * Mobile Malware * Point-of-Sale (POS) Malware * Trojans * Ransomware * Ransomware: The Current Threat Landscape * Ransomware: Risk Mitigation Strategies * Ransomware Remains a Pervasive Threat — What Have We Learned? * Ransomware Remains Prominent Threat * Ransomware Variants * DDOS Attacks * DDOS Attack Types and Mitigation Strategies * Threat Actors Ride the Extortion Waves of RDDOS Attacks * Defending Against DDOS Attacks * Phishing & Online Scams * Phishing Awareness * Business Email Compromise (BEC) * Cryptocurrency Scams * Financial Payment Scams * Telephone Scams * Gift Card Scams * Malvertising * Impersonation Scams * Romance Scams * Job Scams * SMS Scams * Social Media Scams * Tax Scams * Cybersecurity for Critical Infrastructure * Education * Colonial Pipeline Incident: Ransomware Impacts and Mitigation Strategies * Ransomware Attacks Continue to Target Education Sector * Food and Agriculture * Transportation * Water and Wastewater * Healthcare and Public Health * Vulnerabilities * CISA's Known Exploited Vulnerabilities Catalog * Apache Log4j Vulnerability Guidance * Connect * About the NJCCIC * Online Learning * E-Learning for Students * Partner Resources * Video-Based Learning * NJCCIC Membership * Become a Member * Careers * Internships * Women in Cybersecurity * Member Portal Login * Cyber Blog * Events * CyberStart America (CSA) * Cybersecurity Awareness Month (CAM) * Alice in Cyberspace * Cyber Resilience Symposium * Jersey CTF * Cybersecurity Education in New Jersey * Weekly Bulletin * Outreach Presentations * Request a Presentation * Contact Us BEWARE OF AI TAX SCAMS Threat actors are using AI-generated deepfakes and voice cloning to impersonate trusted tax authorities. Learn More AZORULT MALWARE DISTRIBUTED VIA HTML SMUGGLING HTML smuggling and fraudulent Google Sites pages are disseminating AZORult in a new malware campaign. Learn More * Go to slide 1 * Go to slide 2 ALERTS & ADVISORIES NJCCIC MEMBERSHIP WEEKLY BULLETIN OUTREACH PRESENTATIONS CYBER BEST PRACTICES REPORT A CYBERSECURITY INCIDENT REPORT NOW Previous SPOTLIGHT Cybersecurity for Critical Infrastructure Cybersecurity for critical infrastructure is crucial as cyberattacks threaten the confidentiality, integrity, availability, and privacy of information and information systems. Recent events and evolving threats highlight the risks critical infrastructure sectors face, reinforcing the need for preparedness and resiliency plans to ensure risk management, business continuity, disaster recovery, and incident response. Learn More SPOTLIGHT Internships at the NJCCIC The NJCCIC offers internships to college and high school students throughout the year. Our internship program is a paid opportunity open to students from a wide variety of academic disciplines and allows interns to explore the exciting field of cybersecurity. Interns receive an unparalleled opportunity to contribute to ongoing NJCCIC projects and gain relevant work experience for their future careers. Learn More SPOTLIGHT Cybersecurity Policy Templates As cyber threats become increasingly sophisticated, it is critical that organizations implement layered security frameworks to protect their data and infrastructure. Jumpstart the process by using these templates to establish policies that formalize security controls as ongoing processes. Learn More Next MEMBERSHIP WHAT YOU GET FROM JOINING An NJCCIC membership enables you to increase your cybersecurity knowledge and threat awareness. Join today at no cost, and we’ll deliver the latest cyber alerts and vulnerability advisories to your inbox, along with our weekly bulletins, training notifications, and other cybersecurity updates. JOIN NOW 0 Staff Members 0 NJCCIC Members 0 States Represented 0 Countries Represented PUBLICATIONS Previous AZORult Malware Distributed HTML Smuggling Beware of AI Tax Scams Third-Party Vendor Security Malicious Copycat Applications Found in Apple App Store Sophisticated Phishing Scheme Impersonates FCC & Cryptocurrency Platforms Hugging Face AI Platform’s Problem with Malicious AI Change Healthcare Ransomware Attack Highlights Far Reaching Impacts of Cyber Incidents AI and the Spread of Misinformation Phishing Scheme Targets School Staff and Students Beware of Active Subdomain Hijacking Operation Beware of Tax Scams Recent Cyberattacks Impact Financial Services Sector Custom Apex Code Could Lead to Security Vulnerabilities in Salesforce Instances The Current Threat Landscape of Healthcare Be Wary of QR Code Fatigue Schemes Using Deepfake Technology on the Rise Increase in SEO Poisoning and Malvertising Sextortion and Romance Scams: Dodging Cupid’s Malicious Arrow The Aftermath of a SIM Swapping Attack Uptick in Compromised Accounts FBI Warns of New Tech Support Scam Targeting Senior Citizens Protecting Your Data From Getting Into the Wrong Hands Unknown Database Exposes 26 Billion Records Volt Typhoon Targets Legacy Cisco Routers in New Campaign Threat Actors Exploit Common HR Themes in Phishing Campaigns Ivanti Connect Secure Zero-Days Actively Exploited Raptor Technologies Data Privacy Week: Take Control of Your Data SMTP Smuggling Could Allow Spoofed Emails Evolving Extortion Tactics in Ransomware Attacks Cloud Misconfigurations Pose Risk for Data Exfiltration and Cyberattacks Increase in Cryptocurrency Scams Next VIEW ALL PUBLICATIONS 2 Schwarzkopf Dr. Ewing Township, NJ 08628 njccic@cyber.nj.gov WEBSITE DESIGN BY Granicus - Connecting People and Government Loading ...