Skip to content
  Saturday 24 May 2025
Trending
October 14, 2024Nation-State Hackers Targeting Ivanti CSA Vulnerabilities for Network Breaches February 1, 2022How to Fix logiLDA.dll Missing Error 2022 – Logitech Mouse Fix January 30, 2024Cybersecurity Insider Risk Investigation Manager February 1, 2024China-Linked ‘KV-Botnet’ Targeting SOHO Routers Shut Down by U.S. Federal Authorities April 30, 2025<h3>Massive Hack Hits Long Beach: 260,000 Residents Impacted</h3> January 5, 2024NIST Raises Concerns About Cyberthreats Targeting AI Models December 23, 2023Cybersecurity Logistics Specialist SME IV September 10, 2024Cybersecurity Analyst – Continuing Education Assistance December 1, 2023Apple Releases Security Updates for Multiple Products March 26, 2025Comcast Cybersecurity: Engineer 4, Network Engineering – Security
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Security Updates  Cybersecurity Weekly Update: Apple’s Emergency Fix, Iranian Hackers, and More!
Security Updates

Cybersecurity Weekly Update: Apple’s Emergency Fix, Iranian Hackers, and More!

Mister CybersecurityMister Cybersecurity—April 8, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Apple Urges Users to Update Amid Zero-Day Vulnerabilities

Apple has released an emergency update to address two zero-day vulnerabilities, CVE-2023-28205 and CVE-2023-28206, discovered by Google’s Threat Analysis Group and Amnesty International’s Security Lab. These flaws affect iPhones, iPads, and macOS Ventura running Macs. Exploiting these vulnerabilities could enable arbitrary code execution in iOS applications and across browsers on mobile Apple devices. Users are advised to update their devices immediately to protect against potential attacks.

Iranian Nation-State Group Disguised Destructive Hacks as Ransomware Attacks

Microsoft’s Threat Intelligence team has identified MuddyWater, an Iranian nation-state group, as responsible for executing destructive hacks on hybrid environments. These attacks, disguised as ransomware campaigns, were orchestrated in collaboration with another activity cluster known as DEV-1084. MuddyWater has primarily targeted Middle Eastern nations since 2017.

Critical Vulnerability Found in vm2 Sandbox Library

A critical remote code execution vulnerability, CVE-2023-29017, has been discovered in the vm2 JavaScript sandbox module. The vulnerability affects all versions up to and including 3.9.14. Users are urged to install the patch as proof of concept exploits have already been created by researchers.

Microsoft Aids in Sinkholing Cobalt Strike Traffic

Microsoft, Fortra, and the Health Information Sharing and Analysis Center have received a U.S. federal court order to redirect malware traffic from Cobalt Strike-infected computers to sinkhole servers. Cobalt Strike, a popular penetration testing tool, is often used by hackers in ransomware attacks, particularly targeting the healthcare sector.

North Korean Hacking Group Linked to 3CX Supply-Chain Attack

Sophos has reported that the supply-chain attack on enterprise phone company 3CX is linked to the Lazarus Group, a notorious North Korean hacking group. The hackers secretly modified apps to execute malicious commands in the background, stealing sensitive information from users’ web browsers.

DISH Network Faces Lawsuits Following Ransomware Cyber Attack

DISH Network has been hit with multiple class action lawsuits after a ransomware incident led to a multi-day “network outage.” The lawsuits accuse DISH of overstating its operational efficiency and having deficient cybersecurity and IT infrastructure.

Remote Work Practices Increase Organizational Risk

According to Lookout’s State of Remote Work Security Report, 92% of remote employees use personal devices for work tasks, and 32% use apps not approved by IT. This increases the risk profile of organizations as corporate data becomes more accessible through means not visible to IT or security teams.

“Hack the Pentagon” Website Launched

The US Department of Defense has launched a new Hack the Pentagon website to expand its existing bug bounty program. The website will help departments within the DoD run continuous bug bounty programs and onboard new researchers onto projects.

Genesis Market Platform Seized by FBI

The FBI has seized Genesis Market, a major online platform where criminals sell stolen credentials and tools to weaponize data. The market has been connected to millions of financially motivated cyber incidents worldwide.

Canadian Privacy Commissioner Investigates ChatGPT

The Office of the Privacy Commissioner of Canada has launched an investigation into OpenAI’s ChatGPT chatbot, following a complaint alleging the collection, use, and disclosure of personal information without consent.

Samsung Leaks Own Secrets via ChatGPT

After lifting a ban on employees using ChatGPT, Samsung has reportedly leaked its own secrets at least three times, including information related to its device solution and semiconductor business unit.

Remote Work Preferences and Pay Sacrifice

A recent survey by recruiting firm Robert Half reveals that many Americans are willing to sacrifice an average of 18% of their pay to continue working remotely. The survey found that 75% of workers report being happier and more productive when working from home, even though they may work longer hours. However, a Resume Builder survey indicates that 90% of companies will require employees to return to the office in 2023, presenting a potential conflict between employee preferences and employer requirements.

The roundup of this weeks cybersecurity updates highlights the ever-evolving landscape of digital threats and the measures being taken to combat them. From Apple’s emergency fixes for zero-day vulnerabilities to the increasing risk associated with remote work practices, it is evident that organizations and individuals alike must remain vigilant and proactive in safeguarding their digital assets. As new hacking groups emerge and existing ones continue to adapt their tactics, cooperation between the public and private sectors will be crucial in staying ahead of potential threats. It is essential for all stakeholders to prioritize security and adopt best practices to ensure the protection of sensitive information and the resilience of our interconnected digital world.

That wraps up this weeks security roundup. As always stay safe, stay vigilant, and we’ll see you Monday with another update!

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Mister Cybersecurity

Cisco Releases Security Advisories for Multiple Products
CISA Adds Two Known Exploited Vulnerabilities to Catalog
Related posts
  • Related posts
  • More from author
Security Updates

Cybersecurity Update April 17th 2023: Tax Day RAT Campaign, Ransomware Outages and Vulnerable Metaverses

April 17, 20230
Security Updates

Cybersecurity Update April 14th 2023: Russian APT Targets NATO Allies, Emerging Ransomware, and Pentagon Leaks

April 14, 20230
Security Updates

Cybersecurity Update April 13th 2023: Shadow APIs, Legion, and the Power of Generative AI!

April 13, 20230
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Industry News

Rethinking Risk in the AI Era

May 24, 20250
Industry News

Hack on UK Legal Aid Agency Jeopardizes Legal Representation

May 23, 20250
Industry News

Global Darknet Bust: ‘Operation RapTor’ Strikes Criminal Networks

May 23, 20250
Industry News

Unmasking Threats: Exclusive Google Intelligence Webinar

May 23, 20250
Industry News

Cognyte Amplifies Threat Intelligence with $4M GroupSense Acquisition

May 23, 20250
Industry News

Hackers Spread Vidar and StealC Malware Through TikTok Videos Using ClickFix Technique

May 23, 20250
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Rethinking Risk in the AI Era

  • Hack on UK Legal Aid Agency Jeopardizes Legal Representation

  • Global Darknet Bust: ‘Operation RapTor’ Strikes Criminal Networks

  • Unmasking Threats: Exclusive Google Intelligence Webinar

  • Cognyte Amplifies Threat Intelligence with $4M GroupSense Acquisition

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures