About Stacey Ehling

This author has not yet filled in any details.
So far Stacey Ehling has created 35 blog entries.

NJ Tax Refund & NHTSA SMisHing & TOAD Scams

By |2025-09-11T16:00:16-04:00September 11th, 2025|

Too Good to Be True: Fraudulent SMS Text Message Regarding Tax Refund Circulates A new wave of SMS text phishing messages (SMiShing) is being sent to NJ residents and those in other states nationwide. Like previous SMiShing campaigns referencing motor vehicle violations and toll fees, these text messages impersonate the New Jersey Department of the [...]

Municipality Impersonation Scam

By |2025-09-05T12:22:31-04:00September 5th, 2025|

Local Municipality Impersonation to Steal Data and Funds The NJCCIC received reports of threat actors impersonating multiple New Jersey local municipalities to steal sensitive data and funds and exploit public trust. Threat actors take advantage of residents who interact with their local municipalities regularly and are more likely to trust communications appearing to be official. [...]

Fake Help Desk Scam

By |2025-08-28T13:51:23-04:00August 28th, 2025|

The NJCCIC observed a new adversary-in-the-middle (AiTM) phishing campaign aimed at harvesting credentials. This campaign starts with an email claiming to be from the help desk, with a link provided to reset or retain the current password. Upon clicking the provided link, users are directed to a Loveable.app math-based CAPTCHA, which helps threat actors bypass [...]

Docusign Phishing Scam

By |2025-08-14T13:52:12-04:00August 14th, 2025|

The NJCCIC received reports of a phishing scam abusing the legitimate Docusign platform and impersonating a New Jersey organization. In the Docusign envelope email notification, the impersonated organization’s name appears in the sender’s display name and the body of the email, and the sender’s domain name displays the legitimate docusign.net domain. However, the body of the email [...]

Global Conflict: Increase Cyber Vigilance

By |2025-06-13T14:19:42-04:00June 13th, 2025|

The NJCCIC assesses that heightened geopolitical tensions and military confrontation in the Middle East significantly increase the risk of offensive cyber operations by both nation-states and those sympathetic to them and their ideology. While the primary targets of these cyber activities may be the entities in the conflict, the interconnected nature of our global digital [...]

June: Internet Safety Month

By |2025-06-05T10:50:23-04:00June 5th, 2025|

This is Online Safety Month, take a few moments to refresh your knowledge on some online safety basics. Behaviors like using strong passwords, turning on multi-factor authentication (MFA), recognizing and reporting phishing, and updating your software can go a long way in helping you to stay safe online! Click here to get more tips and [...]

Google Chrome Vulnerabilities

By |2025-06-04T10:45:53-04:00June 4th, 2025|

Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged-on user. Depending on the [...]

KEV: Known Exploited Vulnerability Catalog

By |2025-05-29T14:18:13-04:00May 29th, 2025|

Keeping up with new vulnerabilities can be challenging. To help, CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild: the Known Exploited Vulnerability (KEV) catalog. CISA strongly recommends all organizations review and monitor the KEV catalog and prioritize remediation of the listed vulnerabilities to reduce the likelihood of compromise by [...]

May 1: World Password Day

By |2025-04-24T21:37:52-04:00April 24th, 2025|

If you are still writing your passwords on sticky notes, or using your dog's name, you need to make some time to learn how to create strong passwords to protect your data. Click here for resources and information provided by the National Cyber Security Alliance.

Shields Up: Guidance for Organizations

By |2025-03-12T15:53:30-04:00March 12th, 2025|

The Cybersecurity & Infrastructure Security Agency (CISA) recommends all organizations—regardless of size—adopt a heightened posture when it comes to cybersecurity and protecting their most critical assets.  Here are some recommendations to help protect your organization: Reduce the likelihood of a damaging cyber intrusion Validate that all remote access to the organization’s network and privileged or [...]

Go to Top