Skip to content
  Thursday 22 May 2025
Trending
September 22, 2023Webinar: Simplifying and Securing Your Cloud Journey with Practical Strategies May 5, 2024Cybersecurity Architecture – Technical September 21, 2023Senior Cybersecurity Engineer March 11, 2025Engineer, Cybersecurity Level I February 27, 2025<h3>Boost AI Scaling with Test Time Compute</h3> July 14, 2024Cybersecurity Systems Engineer (Telecom) May 2, 2025<h3>Massive €530M Fine Hits TikTok Over China Data Transfers!</h3> December 14, 2024<h3>Massive Data Breach: 17M Patient Records Stolen in Hospital Cyberattack</h3> October 31, 2024Director, Solutions Architect (Cybersecurity & Technology Operations Platforms) October 1, 2024<h3>Dragos Supercharges OT Defense with Network Perception Acquisition</h3>
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Security Updates  Cybersecurity Update March 31st 2023: Unmasking Cybercriminals and Combating Cyber Threats
Security Updates

Cybersecurity Update March 31st 2023: Unmasking Cybercriminals and Combating Cyber Threats

Mister CybersecurityMister Cybersecurity—March 31, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

The past day has been filled with cybersecurity news, from arrests in phishing scams to the discovery of new zero-day exploits. Today we will take a closer look at these events and what they mean for the world of cybersecurity.

Busting a Multi-Million Dollar Phishing Syndicate

In a joint operation between Ukrainian Cyber Police and Czech law enforcement officials, several members of a cybercrime gang were arrested for their involvement in a phishing scam. The gang used over 100 phishing portals to steal financial information from unsuspecting victims in the European Union. The operation is estimated to have earned the criminals around $4.33 million. The perpetrators could face up to 12 years in prison.

3CX Supply Chain Attack: What We’ve Learned

Enterprise communications software creator, 3CX, has confirmed that a supply chain attack has impacted several versions of its desktop app for Windows and macOS. The company is working with Google-owned Mandiant to review the incident and is urging customers to update to version 18.12.422. The extent of the attack is still unknown, but it is suspected that the attackers may have compromised the software build pipeline. The attack has been attributed to North Korean state-sponsored group Labyrinth Chollima.

Biden’s Cybersecurity Strategy: A Path to Improved AppSec?

The Biden administration recently released a National Cybersecurity Strategy that calls for regulatory mandates on vital industry sectors that control critical infrastructure nationwide. The strategy aims to ensure minimum cybersecurity measures for companies providing critical infrastructure, but developers may not be adequately equipped to handle application security. The responsibility for application security ultimately lies with the company, and they must enforce standards and invest in secure code to achieve the proposed cybersecurity strategy.

Zero-Day Exploits in Spyware Campaigns: Android and iOS Under Attack

Google has discovered two advanced spyware campaigns that use zero-day exploits in the Android and iOS operating systems, as well as vulnerabilities in the Samsung Internet Browser. The campaigns were deemed “highly targeted” and Google has been vocal in campaigning against commercial surveillance companies. The use of such spyware puts countries without the resources to survey political dissidents at risk.

Microsoft Azure SFX Security Breach: The Rise of “Super FabriXss”

A critical security breach in Azure Service Fabric Explorer (SFX) has been discovered and patched by Microsoft. Known as “Super FabriXss,” the vulnerability could have led to unauthenticated remote code execution on a container hosted on a Service Fabric node. The issue has now been resolved in the March 2023 Microsoft Patch Tuesday update.

RedGolf Group Introduces KEYPLUG Backdoor

Chinese state-sponsored group RedGolf has been linked to the use of a customized Windows and Linux backdoor called KEYPLUG. The group has a global reach and has demonstrated the ability to exploit new vulnerabilities quickly. RedGolf has been detected using a wide range of malware families and has targeted government entities and state government networks in various nations. Organizations are advised to regularly patch their systems and monitor external-facing network devices to guard against RedGolf and other advanced persistent threats.

Latitude Financial Data Breach

Australian financial services company Latitude Financial has suffered a large-scale data breach that exposed the personal information of over 14 million customers. The breach was initially discovered on March 16 and was thought to have affected a fraction of the customers. The data breach was later found to be more extensive than originally believed and involved the theft of customer names, addresses, telephone numbers, driver’s license numbers, passport numbers, and Medicare numbers.

That wraps up todays cybersecurity brief. As always, Stay safe, stay vigilant and we’ll see you tomorrow with our weekly roundup!

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Mister Cybersecurity

CISA Releases One Industrial Control Systems Advisory
Mozilla Releases Security Update for Thunderbird 102.9.1
Related posts
  • Related posts
  • More from author
Security Updates

Cybersecurity Update April 17th 2023: Tax Day RAT Campaign, Ransomware Outages and Vulnerable Metaverses

April 17, 20230
Security Updates

Cybersecurity Update April 14th 2023: Russian APT Targets NATO Allies, Emerging Ransomware, and Pentagon Leaks

April 14, 20230
Security Updates

Cybersecurity Update April 13th 2023: Shadow APIs, Legion, and the Power of Generative AI!

April 13, 20230
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity Engineer (Top Secret Clearance Required)

May 22, 20250
Careers

Cybersecurity Engineer, Littoral Combat Ship Software Support (San Diego, CA)

May 22, 20250
Careers

Cybersecurity Architect

May 22, 20250
Careers

Cybersecurity Engineer III – Application Security

May 22, 20250
Careers

Cybersecurity Engineer

May 22, 20250
Careers

Cloud Cybersecurity & Automation Engineer

May 22, 20250
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity Engineer (Top Secret Clearance Required)
  • Cybersecurity Engineer, Littoral Combat Ship Software Support (San Diego, CA)
  • Cybersecurity Architect
  • Cybersecurity Engineer III – Application Security
  • Cybersecurity Engineer

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures