Cyber Threat: Okta Breach

By |2024-01-04T21:47:51-05:00October 26th, 2023|Scams|

Okta identity and access management service identified adversarial activity that leveraged a stolen credential to access the support case management system. The threat actor was able to view sensitive HTTP Archive (HAR) files. This article explains the lessons learned from this to protect against this.

Microsoft Phishing Email

By |2024-06-19T12:38:30-04:00October 3rd, 2023|Microsoft, Scams|

“Your Account Is Set To Close” is a phishing email tactic that claims your Microsoft account is set to be closed on a specific date due to inactivity or failed errors. It asks you to sign in to your account before the given date to avoid deletion. Read to stay vigilant of scams like this.

Social Media Loves Scams

By |2024-07-01T10:15:55-04:00September 27th, 2023|Scams|

Hackers use social media to target unsuspecting users searching for connections, job and business opportunities, and more. LinkedIn is one of many platforms for social engineering schemes as its users inherently trust it more than others due to its focus on careers.

QR Code Phishing Campaigns

By |2024-01-17T15:46:44-05:00August 30th, 2023|Scams|

The NJCCIC recently observed two phishing campaigns in which threat actors included suspicious links via QR codes. Quick Response (QR) codes are square barcodes that can be scanned by smartphones to quickly send users to a website, download an application, or direct payments.

Maui Wildfire Charity Scams

By |2024-01-22T20:31:55-05:00August 24th, 2023|Scams|

Individuals seeking to donate to relief efforts are targeted in charity scams initiated by threat actors using social engineering tactics through emails, SMS messaging, phone calls, and via social media. Such can be seen in the aftermath of the recent devastating wildfires in Maui.

Go to Top