NJ's Current Cyber Alert Level: "GUARDED". More . . .

Hide banner
Skip to Main Content
Home NJCCIC Menu
OFFICIAL SITE OF THE STATE OF NEW JERSEYGovernor Phil Murphy • Lt. Governor Tahesha Way
Report Careers Portal Login Membership
Go
I WANT TO...

HOW DO I...

Apply...

For a Cybersecurity Grant

LEARN MORE

Learn More aboutFor a Cybersecurity Grant

CLOSE FINDER
I WANT TO...
  • Home NJCCIC
  • Report
    • Incident Reporting
      • Report a Cybersecurity Incident
      • Report a Data Breach
      • How To File a Report
    • Vulnerability Disclosure
      • Report a Vulnerability
      • Vulnerability Disclosure Policy
      • Acknowledgements
  • Guidance and Best Practices
    • Account Security
      • Multi-Factor Authentication
      • Credential Stuffing
      • Google
      • Encryption: The Basics
      • Passwords, Passwords, Passwords
    • Cyber Hygiene
      • Be Prepared: NJCCIC Cybersecurity Survival Guide
      • Cybersecurity for Small & Medium-Sized Businesses
      • Cybersecurity Glossary
      • Importance of Digital Spring Cleaning and Practical Tips
      • Back-to-School Cybersecurity
      • Backups: The Cure to Viral Cyber Infections
      • Stay Cyber Safe During the Holidays
      • Applying Standards
      • Cyber Safe Travel Tips
      • How Big is Your Footprint?
      • Information Asset Management
    • Device Security
      • Securing All Your Shiny New Connected Devices
      • The Nefarious Use of Bluetooth Tracking Devices
      • IoT Device Security and Privacy
      • Guide to Accessing Your Android Device’s Security & Privacy Settings
      • Mobile Device Security
      • User Beware: Your Smartphone Is Tracking Your Every Move
    • Email Security
      • Compromised Email Accounts
      • Phishing and Other Social Engineering Attacks
      • Sender Policy Framework - SPF Guide
      • Spotting a Spoofing
    • Identity Theft & Privacy
      • Tax Scams and Identity Theft: What You Need to Know
      • Privacy and Security Concerns of Software and Services
      • Data Breach Prevention
      • Compromised PII and Identity Theft Resources and Recommendations
      • Freezing Your Credit
      • Data Privacy
    • Artificial Intelligence
      • ChatGPT and Its Impact on Cybersecurity
      • Is Seeing Believing? A Look into Deepfakes
      • Seeing AI to AI: Artificial Intelligence and its Impact on Cybersecurity
    • Internet Safety
      • Keeping Children Safe Online
      • Magecart Attacks
      • Malvertising: More than a Nuisance
    • Physical Security
    • Social Media Security
      • Guide to Accessing TikTok’s Security & Privacy Settings
      • Guide to Accessing Facebook’s Security & Privacy Settings
      • Guide to Accessing Instagram’s Security & Privacy Settings
      • Guide to Accessing X’s Security & Privacy Settings
      • Social Media: Sharing More Than What You Post
      • Social Media Apps
    • Telecommuting
      • Tips for Teleworkers, Remote Access Security
    • Resources for Businesses & Government
      • Don't Be Fooled: Ways to Prevent BEC Victimization
      • Insider Threats
      • Supply Chain Security
      • Considering Cyber Insurance? What You Need to Know
    • Wi-Fi & Network Security
      • Configuring & Securing a Home Wi-Fi Router
      • Network Segmentation
      • Virtual Private Networks
  • Grants and Resources
    • Grants
      • Safe Drinking Water Cybersecurity Grant Program (SDWCGP)
      • State and Local Cybersecurity Grant Program (SLCGP)
    • State Resources
      • Statewide Information Security Manual (SISM)
      • NJCCIC Strategic Plan
      • NJ State ICTS Circular
      • Election Security
      • Cybersecurity Program Controls Assessment (CPCA)
    • Templates
      • Policy Templates
    • Trainings
    • Online Learning
      • E-Learning for Students
      • Partner Resources
      • Video-Based Learning
    • Critical Infrastructure Cybersecurity Outreach Program
      • Sector Threat Analysis Reports
      • Attack Types
      • Recommendations
      • Resources
  • Threat Landscape
    • Latest Alerts and Advisories
    • Public Data Breaches
    • 2025 Cyber Threat Assessment
    • Malware
      • ATM Malware
      • Spyware
      • Botnets
      • Cryptocurrency-Mining Malware
      • Exploit Kits
      • Industrial Control Systems (ICS) Malware
      • MacOS Malware
      • Mobile Malware
      • Point-of-Sale (POS) Malware
      • Trojans
    • Ransomware
      • Ransomware: The Current Threat Landscape
      • The Evolution of Ransomware: A 5-Year Perspective
      • Ransomware: Risk Mitigation Strategies
      • Ransomware Remains a Pervasive Threat — What Have We Learned?
      • Ransomware Remains Prominent Threat
      • Ransomware Variants
    • DDOS Attacks
      • DDOS Attack Types and Mitigation Strategies
      • Threat Actors Ride the Extortion Waves of RDDOS Attacks
      • Defending Against DDOS Attacks
    • Phishing & Online Scams
      • Social Engineering
      • Phishing Awareness
      • Business Email Compromise (BEC)
      • Cryptocurrency Scams
      • Financial Payment Scams
      • Telephone Scams
      • Gift Card Scams
      • Malvertising
      • Impersonation Scams
      • Romance Scams
      • Job Scams
      • SMS Scams
      • Social Media Scams
      • Tax Scams
    • Vulnerabilities
      • CISA's Known Exploited Vulnerabilities Catalog
      • Apache Log4j Vulnerability Guidance
  • Connect
    • About the NJCCIC
    • NJCCIC Membership
      • Become a Member
    • Careers
      • Internships
      • Women in Cybersecurity
    • Member Portal Login
    • Cyber Blog
    • Events
      • Cybersecurity Awareness Month (CAM)
      • Alice in Cyberspace
      • Cyber Resilience Symposium
      • Jersey CTF
      • Garden State CTF
      • Cybersecurity Workshop
    • Cybersecurity Education in New Jersey
    • Weekly Bulletin
    • Outreach Presentations
      • Request a Presentation
    • Contact Us

Jump to subpage...

  • Latest Alerts and Advisories
  • Public Data Breaches
  • 2025 Cyber Threat Assessment
  • Malware+
    • ATM Malware+
      • GreenDispenser
      • Ploutus
      • Prilex
    • Spyware
    • Botnets+
      • Bots and Botnets: There Are Zombies Among Us
      • ADB.Miner
      • Bashlite
      • Mirai
      • Mozi
      • Necurs
    • Cryptocurrency-Mining Malware
    • Exploit Kits+
      • Angler
      • Neutrino
      • Nuclear
      • RIG
      • Underminer
    • Industrial Control Systems (ICS) Malware+
      • BlackEnergy
    • MacOS Malware+
      • OceanLotus
      • Shlayer
      • Wirelurker
    • Mobile Malware+
      • Android Malware+
        • Exo/Exobot
        • GnatSpy
        • LokiBot
        • Roaming Mantis
        • ViperRAT
        • xHelper
        • XLoader
      • iOS Malware+
        • Pegasus
        • Wirelurker
        • XcodeGhost
    • Point-of-Sale (POS) Malware+
      • RawPOS
      • AbaddonPOS
    • Trojans+
      • Emotet
      • Dark Comet
      • Adwind
      • Agent Tesla
      • AZORult
      • BankBot/Spy Banker
      • BianLian
      • BlackEnergy
      • DanaBot
      • Dridex
      • ELECTRICFISH
      • FlawedAmmyy
      • Glupteba
      • Gold Dragon
      • GootKit
      • Hancitor
      • HiddenWasp
      • IcedID
      • Kronos
      • Kryptik
      • Mirai
      • NanoCore
      • Nemucod
      • NetWire RAT
      • NJRat
      • Olympic Destroyer
      • Petya
      • PlugX
      • Poison Ivy
      • Predator the Thief
      • Qbot
      • Quasar RAT
      • Raccoon
      • Ramnit
      • REMCOS
      • RevengeRAT
      • Ryuk Stealer
      • Smoke Loader
      • Spidey Bot
      • SpyNote
      • TrickBot
      • Ursnif
      • Winnti
      • X-Agent
      • Zbot/Zeus
  • Ransomware+
    • Ransomware: The Current Threat Landscape
    • The Evolution of Ransomware: A 5-Year Perspective
    • Ransomware: Risk Mitigation Strategies
    • Ransomware Remains a Pervasive Threat — What Have We Learned?
    • Ransomware Remains Prominent Threat
    • Ransomware Variants+
      • WannaCry
      • Bit Paymer/DoppelPaymer
      • Buran/Zeppelin
      • Cerber
      • Clop
      • CryptoWall
      • eCh0raix
      • Ekans/Snake
      • LockerGoga
      • Magniber
      • Maze
      • MedusaLocker
      • MegaCortex
      • Nemty
      • Phobos/Dharma
      • PureLocker
      • Ragnarok
      • Snatch
      • Sodinokibi/REvil
      • TeslaCrypt
  • DDOS Attacks+
    • DDOS Attack Types and Mitigation Strategies
    • Threat Actors Ride the Extortion Waves of RDDOS Attacks
    • Defending Against DDOS Attacks
  • Phishing & Online Scams+
    • Social Engineering
    • Phishing Awareness+
      • Don’t Get Harpooned by a Whaling Attack
    • Business Email Compromise (BEC)
    • Cryptocurrency Scams+
      • Cryptojacking Malware
    • Financial Payment Scams
    • Telephone Scams+
      • SIM Swapping Attacks
    • Gift Card Scams
    • Malvertising
    • Impersonation Scams+
      • Insider Threats
      • Protecting Against Tech Support Scams
      • Trust in Government Online
      • What’s in a Domain Name – Trust!
    • Romance Scams
    • Job Scams
    • SMS Scams+
      • SMS Text Phishing Continues
      • SMS Phishing Scams
    • Social Media Scams
    • Tax Scams
  • Vulnerabilities+
    • CISA's Known Exploited Vulnerabilities Catalog
    • Apache Log4j Vulnerability Guidance

Threat Landscape

Latest Alerts and Advisories

Font Size: + -
Feedback Print

Archived News
  • Wire Transfer Fraud for Real Estate Transactions

    03/13/2025

  • Browser Extensions and Malicious Downloads Install Infostealers

    03/13/2025

  • Uptick in Facebook Scams

    03/06/2025

  • Eleven11bot Botnet Grows to Over 86,000 Devices, Thousands Geolocate to New Jersey

    03/06/2025

  • Account Compromises

    02/27/2025

  • Threat Actors Exploit Trusted Accounting Software

    02/27/2025

  • Beware of Quishing Campaigns with HR or IT Lures

    02/20/2025

  • Bank Credential Phishing Schemes

    02/20/2025

  • Valentine’s Day Scams Attempt to Steal More Than Hearts

    02/13/2025

  • Uptick in Vishing Scams

    02/13/2025

  • Walmart Scam Claims Purchase of PlayStation 5

    02/13/2025

  • XWorm Malware Quickly Slithers in Multiple Campaigns

    02/06/2025

  • Business Email Compromise Campaign Circulating

    02/06/2025

  • Tax-Related Phishing Scams Observed Delivering Malware

    01/30/2025

  • Ransomware Groups Abuse Microsoft Teams, Impersonate Help Desk

    01/23/2025

  • Phishing Emails Impersonate IRS, Require Tax Payment

    01/23/2025

  • Unpaid Road Toll SMiShing Scams Resurface

    01/16/2025

  • Fasthttp Abused to Compromise Microsoft 365 Accounts

    01/16/2025

  • FunkSec RaaS Dominates the Ransomware Landscape in December

    01/16/2025

  • Compromised Browser Extensions

    01/09/2025

« First « Prev | 1 | 2 | 3 | 4 | 5 | ... Next » Last » 1 - 20 of 132 items
2 Schwarzkopf Dr. Ewing Township, NJ 08628 njccic@cyber.nj.gov

WEBSITE DESIGN BY Granicus - Connecting People and Government

Loading ...