CyberSecurity

Catch-IT: Multiple Vulnerabilities Found in Google Chrome

Multiple vulnerabilities have been discovered in Google Chrome, the most severe, CVE-2025-5419,of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged-on user. Depending on the privileges [...]

Catch-IT: Beware of Latest Text Scam Impersonating NJ MVC

Over the last week, the NJCCIC has received several incident reports from NJ residents regarding an SMS text phishing (SMiShing) scam impersonating the Department of Motor Vehicles (DMV). These messages claim that the user has an outstanding traffic ticket and payment is due. If not paid by May 29, [...]

Catch-IT: Chrome Users, Update Now!

A new zero-day vulnerability (CVE-2025-2783) in Google Chrome is being actively exploited in the wild. This serious flaw lets attackers bypass Chrome's sandbox and potentially run malicious code without user interaction. Researchers indicated “infection occurred immediately after the victim clicked on a link in a phishing email, and the [...]

Catch-IT: Google Warns of Two Critical Android Vulnerabilities

Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for remote code execution with no additional execution privileges needed. These flaws, actively exploited in coordinated attacks, target devices running Android versions 12 through 15 and have already been linked to high-profile breaches involving [...]

Catch-IT: Facebook Business Users Beware, Thousands Hit by New Phishing Scam

Check Point warns that a large-scale phishing campaign is targeting Facebook accounts with phony copyright infringement notices. The phishing emails have targeted more than 12,000 email addresses at hundreds of companies. Nearly all of the emails targeted individuals in the US, the EU, and Australia, though the researchers also [...]

Catch-IT: Beware of Uptick in Phishing Tactics

Vishing, Whaling, SMiShing...what do these things have in common?  Although seemingly tied to nautical terms, they are all common phishing tactics.  Phishing is a type of social engineering attack that uses email, phone, social media, and other means of personal communication to trick people into providing sensitive information.  So, what [...]

Catch-IT: Multiple Vulnerabilities in Google Android OS

Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for privilege escalation. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could [...]

Catch-IT: Apple Patches Actively Exploited Zero-Day Affecting iPhones, Macs, and More

Apple has released software updates to address several security flaws across its portfolio, including a zero-day vulnerability that it said has been exploited in the wild. The vulnerability, tracked as CVE-2025-24085, has been described as a use-after-free bug in the Core Media component that could permit a malicious application already installed on a [...]

Catch-IT: Ransomware on the Rise

 Ransomware Continues to Gain Momentum Ransomware continues to dominate the threat landscape, posing significant risks to organizations. The NJCCIC continues to receive reports of ransomware incidents impacting New Jersey private and public sector organizations, including educational institutions and local governments. Fog ransomware and 3AM ransomware are two significant variants [...]

4 Primary Benefits Of Penetration Testing

Regular penetration testing helps your organization make its network more secure by identifying security vulnerabilities that intruders may exploit and providing remediation recommendations.  As a universally applicable cybersecurity discipline, every organization can leverage penetration testing to continually reinforce its defenses. Here are 4 primary benefits of regular penetration testing: [...]

3 Important Considerations for 2024

With 2024 in full swing, we know budgets have been prepared and are in full-swing implementation.  Hoping you made considerations in security investments for the coming year to better protect your organization from growing threats, we wanted to highlight 3 things for consideration.  If you haven't given these areas [...]

By |2024-01-17T12:25:24-05:00January 17th, 2024|Categories: BMT Announcement, CyberSecurity, News|Tags: , , , , |

Vietnamese Hackers Deploy Python-Based Stealer via Facebook Messenger

A new phishing attack is leveraging Facebook Messenger to propagate messages with malicious attachments from a "swarm of fake and hijacked personal accounts" with the ultimate goal of taking over the targets' accounts. "Originating yet again from a Vietnamese-based group, this campaign uses a tiny compressed file attachment that [...]

By |2023-09-12T07:35:24-05:00September 11th, 2023|Categories: BMT Announcement, CyberSecurity|
Go to Top