Cyber Command
Cyber Command Corporation is an IRS approved 501(c)(3) nonprofit, public charity that offers cybersecurity awareness training and develops viable cybersecurity defense software.
Mission Statement
Cybersecurity concerns are one of the most critical threats facing the security of our nation, which impacts all United States citizens, including individuals, families, businesses of all sizes and verticals, and government organizations.
Our mission is to reduce threat risk by promoting cybersecurity education and awareness, facilitating research, advancing development, and enabling dissemination of cybersecurity defense products and services to USA individuals, public and private organizations.
Want to organize a free virtual or in-person cybersecurity class for seniors in your neighborhood? Please contact us below and we’ll get the process started!
Cybersecurity Intelligence Feed & Resources
This section contains free cybersecurity related articles and knowledge to help learn critical cybersecurity lessons.
Top Routinely Exploited Vulnerabilities
The CISA, in partnership with the FBI, NSA, and cybersecurity authorities of Australia, Canada, New Zealand, United Kingdom released a Joint Cybersecurity Advisory covering 47 common vulnerabilities and exposures (CVEs) that were routinely or often exploited by malicious actors in 2023.
Vulnerabilities in Adobe Products
Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user.
Vulnerabilities in Citrix Products
Multiple vulnerabilities have been discovered in Citrix products, the most severe of which could allow for remote code execution. Citrix ADC performs application-specific traffic analysis to intelligently distribute, optimize, and secure Layer 4 - Layer 7 network traffic for web applications.
Vulnerabilities in Google Chrome
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user.
Vulnerabilities in Ivanti Endpoint Manager
Multiple vulnerabilities have been discovered in Ivanti Endpoint Manager, the most severe of which could allow for remote code execution. Ivanti Endpoint Manager is a client-based unified endpoint management software. Successful exploitation could allow for remote code execution
Norton LifeLock Identity Theft Alerts
Individuals, who are enrolled in the Identity Theft Protection program offered by LifeLock, are receiving notifications in error by LifeLock. These notifications are being sent by email or text stating "New Property Report Detected." It is an issue with LifeLock’s system.
Vulnerability in Google Android
A vulnerability has been discovered in Google Android that could allow for remote code execution. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of this vulnerability could be disastrous.
Breach Notification – Schneider Electric
A new threat group identified as Hellcat claims to have stolen sensitive user data after breaching Schneider Electric's Jira system. The alleged attack compromised critical information, including over 400,000 rows of user data, totaling more than 40GB.
FFY2024 SLCGP Information Session
The NJCCIC invites NJ public sector organizations and agencies to join a webinar on Thursday, November 21 from 1:00PM-2:00PM to receive information regarding the federal fiscal year (FFY) 2024 State and Local Cybersecurity Grant Program. See Zoom link below to join the webinar.
Our Services
C3 helps reduce the risk of compromise by promoting cybersecurity education and awareness, and by facilitating research, development and dissemination of viable cybersecurity defense products and services to individuals, public and private organizations in the United States.
In-Person Training Classes
Virtual Classes
Phishing Simulations
Security Posture Analysis
Credential Leak Checks
Policies, Procedures & Plans
Phishing Attack Prevention
Network Intrusion Protection
Actionable Intelligence
Cyber Command is a registered 501(c)(3) nonprofit, public charity. EIN 93-2718000.
Our Board of Directors
Joshua Weiss, President
Arthur Warady, Treasurer
Kelly Whitis, Secretary
Contact Us
We’d love to hear from you. Please use the contact form below to reach us.