Skip to content
  Tuesday 14 April 2026
Trending
May 5, 2025<h3>US Set to Ban Huione Group Amid Cybercrime Allegations</h3> April 18, 2024CISA Releases Three Industrial Control Systems Advisories January 11, 2025AEGIS Senior Cybersecurity Manager January 19, 2024Cybersecurity Engineer III July 27, 2023Mitsubishi Electric CNC Series | CISA April 27, 2025Enterprise Account Executive – Cybersecurity May 29, 2024IT Cybersecurity Specialist (INFOSEC) August 7, 2025Senior Cybersecurity Threat Intelligence Analyst September 16, 2025Lead Cybersecurity Architect – Macintosh July 22, 2025<h3>From Graffiti to Grand Strategy: The Rise of Chinese Hackers</h3>
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Security Updates  Cybersecurity Update March 20th 2023: Latest Breaches, Ransomware Attacks, and Arrests
Security Updates

Cybersecurity Update March 20th 2023: Latest Breaches, Ransomware Attacks, and Arrests

Mister CybersecurityMister Cybersecurity—March 20, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
As the world becomes increasingly reliant on digital infrastructure, cybercriminals are finding new ways to exploit vulnerabilities and gain unauthorized access to sensitive data. In todays update, we will cover the latest breaches, ransomware attacks, and arrests so lets jump in.

FBI Apprehends ‘Pompompurin’, The Brains Behind BreachForums Operation

Conor Brian Fitzpatrick, resident of Peekskill, who confessed to being “pompompurin,” the owner of BreachForums, was arrested by FBI agents on March 15, 2023. Fitzpatrick had been an active member of RaidForums, a forum to facilitate the sale of stolen data. BreachForums is a spin-off of RaidForums that was disrupted in February 2022 by law enforcement.

Netherlands-based Royal Dirkzwager Acknowledges Play Ransomware Attack on Systems

The Royal Dirkzwager, a Dutch maritime logistics company, was hit with ransomware from the Play group, the latest in a string of attacks targeting the shipping industry. The company’s systems were not affected, but the ransomware attack involved the theft of data from servers that held a range of contracts and personal information.

Cancer Patient Takes Legal Action Against Healthcare Provider After Hackers Publish Private Pics

The Lehigh Valley Health Network suffered a ransomware attack on Feb. 6, resulting in the posting of nude photos of a cancer patient along with her health records. The patient has since filed a lawsuit seeking class action status for all parties whose data was exposed and monetary damages to be determined later.

Emotet Malware Spreads Through Microsoft OneNote Files, Evading Security Measures

Emotet malware is now being distributed using Microsoft OneNote email attachments, aiming to bypass Microsoft security restrictions and infect more targets. The malware is hidden underneath the “View” button in reply-chain emails that impersonate guides, how-tos, invoices, job references, and more. The threat actors have hidden a malicious VBScript file called ‘click.wsf’ underneath the “View” button.

Suit Launched Against MKS Instruments in Wake of Ransomware Attack

MKS Instruments, a semiconductor chipmaker, was hit with a ransomware attack in February, which impacted business systems and disrupted the company’s ability to process orders and provide other services. A former employee is now leading a class action lawsuit against the company, claiming its negligent cybersecurity led to the unauthorized breach of personal identifying information.

Kaspersky Unveils Updated Conti Decryption Tool for Combating Cybercrime

Kaspersky has published a new version of a decryption tool for the Conti ransomware based on previously leaked source code. The researchers added all 258 keys to the latest build of Kaspersky’s utility RakhniDecryptor 1.40.0.00. Users can download the decryptor from the Kaspersky’s “No Ransom” site.

NBA Cautions Fans About Data Leak Following Cyberattack on External Newsletter Platform/h3>

The National Basketball Association (NBA) has launched an investigation into a data breach that affected an unknown number of individuals. While the NBA’s systems were not impacted, an unauthorized third party accessed and created copies of names and email addresses of some of its fans. The breach did not compromise usernames, passwords, and other information. These recent incidents highlight the continued need for strong cybersecurity measures to protect sensitive data from cybercriminals. Businesses must remain vigilant and keep their systems up-to-date with the latest security patches and protocols. Individuals must also be careful with their personal information and only share it with trusted sources. The fight against cybercrime is ongoing, and we must all do our part to stay safe in the digital age. That wraps up todays update and as always stay safe, stay vigilant and we’ll see you tomorrow with another update!
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Mister Cybersecurity

Cybersecurity Update March 18th 2023: Banking Sector Risks, Facial Recognition Concerns, and Ransomware Attacks
CISA Releases Updated Cybersecurity Performance Goals
Related posts
  • Related posts
  • More from author
Security Updates

Cybersecurity Update April 17th 2023: Tax Day RAT Campaign, Ransomware Outages and Vulnerable Metaverses

April 17, 20230
Security Updates

Cybersecurity Update April 14th 2023: Russian APT Targets NATO Allies, Emerging Ransomware, and Pentagon Leaks

April 14, 20230
Security Updates

Cybersecurity Update April 13th 2023: Shadow APIs, Legion, and the Power of Generative AI!

April 13, 20230
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Threat Advisories

CISA Adds Two Known Exploited Vulnerabilities to Catalog

April 14, 20260
Careers

Lead Cybersecurity WAF Engineer

April 14, 20260
Careers

Senior Manager, Cybersecurity Detection Engineering

April 14, 20260
Careers

Lead Cybersecurity WAF Engineer

April 14, 20260
Careers

Lead Cybersecurity WAF Engineer

April 14, 20260
Careers

Lead Cybersecurity WAF Engineer

April 14, 20260
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • CISA Adds Two Known Exploited Vulnerabilities to Catalog
  • Lead Cybersecurity WAF Engineer
  • Senior Manager, Cybersecurity Detection Engineering
  • Lead Cybersecurity WAF Engineer
  • Lead Cybersecurity WAF Engineer

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures