Mathy Vanhoef, a researcher at the University of Leuven, discovered a vulnerability in the WiFi Protected Access II (WPA2) protocol – used to secure modern WiFi networks – and developed an exploit using a Key Reinstallation Attack technique, dubbed KRACK. The technique affects the 4-way handshake of the WPA2 protocol, allowing a threat actor within range of the affected WiFi network to conduct a Man-in-the-Middle (MitM) attack. Since the vulnerability is present in the protocol itself, nearly every WiFi-capable device is affected including, but not limited to: Android, Linux, iOS, macOS, Windows, OpenBSD, and IoT devices. Vanhoef provides in-depth details of the KRACK attack on awebsite and in his research paper. A list of affected products and available patches are provided in the CERT Coordination Center (CERT/CC) Vulnerability Note (VU #228519) and will continue to be updated as more information is released. Devices running supported versions of Microsoft operating systems that have had the October 10th security updates installed are protected from this vulnerability. The NJCCIC recommends all users and administrators review the attack details and the CERT/CC Vulnerability Note to learn more and apply updates as soon as they are made available.