Skip to content
  Friday 12 December 2025
Trending
December 22, 2024Cybersecurity Analyst April 30, 2025Cybersecurity Specialist July 6, 2024Cybersecurity Program Manager January 10, 2025Google Project Zero Unveils Samsung Device Hack – Zero-Click Exploit Exposed! October 13, 2024Senior IT Project Manager – Cybersecurity January 10, 2025Cybersecurity – Information System Security Officer (ISSO) September 8, 2023Principal Cybersecurity Engineer March 24, 2025Cybersecurity Architect III – AWS Cloud March 15, 2024Cybersecurity Defensive Operations – Leadership August 7, 2025Advisor, Cybersecurity Engineering & Operations
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Security Updates  Cybersecurity Update March 16th 2023: ViLE Criminals, Zero Days & Scams Galore
Security Updates

Cybersecurity Update March 16th 2023: ViLE Criminals, Zero Days & Scams Galore

Mister CybersecurityMister Cybersecurity—March 16, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Two Men Charged in DEA Portal Hack

Prosecutors have charged two US men with illegally accessing an online portal for the US Drug Enforcement Agency, part of the larger ViLE criminal organization. This group uses faked emergency data requests to dox victims and extort them for money or access to social network accounts.

Americans Lose Billions to Online Scams

The FBI reported that American citizens lost over $10 billion to online scammers in 2022. With over 800,000 scam complaints, phishing activity accounted for 37.5% of complaints, while crypto investment fraud saw a massive increase of 185% on the year to $2.57 billion.

Humans Beat AI in Phishing (For Now)

A HoxHunt research paper revealed that a professional red team outperformed ChatGPT in phishing click rates (4.2% versus 2.9%). However, researchers caution that the GPT-4 model could offer substantial improvement in effectiveness.

US Marshals Service Data for Sale

Hundreds of gigabytes of data, allegedly stolen from the US Marshals Service, have been listed for sale on a Russian-speaking forum. The data includes information on the witness protection program, aerial footage of military bases, and wiretapping operation details.

Dero Cryptojacking Campaign

Researchers at Crowdstrike observed the first cryptojacking campaign using the Dero cryptocurrency. Threat actors targeted exposed Kubernetes clusters with misconfigured authentication to deploy a Docker image, starting the miner across all Kubernetes nodes.

Federal Agency Data at Risk

Telerik Bug Exploited for Data Theft

CISA warned that multiple threat groups were able to breach a federal agency and steal data by exploiting a Telerik vulnerability in an unpatched Microsoft IIS Web server. Teams running Telerik UI for ASP.NET Ajax builds from earlier than 2020 are urged to take immediate action.

Adobe ColdFusion Bug Exploited as a Zero-Day

CISA added a critical vulnerability impacting Adobe ColdFusion versions 2021 and 2018 to its catalog of security bugs exploited in the wild. Administrators are advised to install the security updates as soon as possible and apply security configuration settings outlined in the lockdown guides.

Crypto Laundering Schemes and Cyber Attacks

ChipMixer Crypto Laundering Platform Shut Down

Authorities across Europe and the U.S. dismantled ChipMixer, an unlicensed cryptocurrency mixer responsible for laundering $3.75 billion worth of digital assets. The operation led to the seizure of $47.5 million in Bitcoin and 7 TB of data.

Russian Hackers Planning Cyber Attack on Ukraine

Microsoft released a report suggesting that Russian hackers are planning a new ransomware-style attack on Ukraine, targeting organizations that serve the country’s supply lines. The hacking team “Sandworm” is believed to be responsible for several attacks on Ukrainian organizations.
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Mister Cybersecurity

Threat Actors Exploited Progress Telerik Vulnerability in U.S. Government IIS Server
Siemens SCALANCE W1750D Devices | CISA
Related posts
  • Related posts
  • More from author
Security Updates

Cybersecurity Update April 17th 2023: Tax Day RAT Campaign, Ransomware Outages and Vulnerable Metaverses

April 17, 20230
Security Updates

Cybersecurity Update April 14th 2023: Russian APT Targets NATO Allies, Emerging Ransomware, and Pentagon Leaks

April 14, 20230
Security Updates

Cybersecurity Update April 13th 2023: Shadow APIs, Legion, and the Power of Generative AI!

April 13, 20230
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Threat Advisories

Siemens Energy Services | CISA

December 12, 20250
Threat Advisories

Johnson Controls iSTAR | CISA

December 12, 20250
Threat Advisories

Varex Imaging Panoramic Dental Imaging Software

December 12, 20250
Threat Advisories

CISA Adds One Known Exploited Vulnerability to Catalog

December 12, 20250
Threat Advisories

Siemens SINEMA Remote Connect Server

December 12, 20250
Threat Advisories

Siemens Building X – Security Manager Edge Controller

December 12, 20250
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Siemens Energy Services | CISA
  • Johnson Controls iSTAR | CISA
  • Varex Imaging Panoramic Dental Imaging Software
  • CISA Adds One Known Exploited Vulnerability to Catalog
  • Siemens SINEMA Remote Connect Server

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures