Skip to content
  Saturday 11 April 2026
Trending
March 12, 2024Cybersecurity Engineering – Leadership November 7, 2023CISA Releases Guidance for Addressing Citrix NetScaler ADC and Gateway Vulnerability CVE-2023-4966, Citrix Bleed January 1, 2024Bypassing Windows 10 and 11 Protections: A New Variant of DLL Search Order Hijacking Discovered March 6, 2024GhostSec and Stormous Team Up for Coordinated Ransomware Attacks Across 15+ Countries March 7, 2024Embedded PLC Web Servers: Opening the Door to a New Class of OT Malware December 11, 2024Title: “Chinese Hacker Charged for Hacking 81,000 Sophos Firewalls with Zero-Day Exploit”<br /> <br /> In a groundbreaking move, the United States has filed charges against a Chinese hacker for exploiting a zero-day vulnerability in over 81,000 Sophos firewalls. The sophisticated cyber attack targeted a wide range of organizations and posed a significant threat to national security. This incident sheds light on the growing concerns of cyber warfare and the urgent need for enhanced cybersecurity measures.<br /> <br /> The hacker, allegedly linked to the Chinese government, utilized the zero-day exploit to infiltrate the Sophos firewalls and gain unauthorized access to sensitive information. This breach has raised alarms within the cybersecurity community, highlighting the importance of identifying and addressing vulnerabilities in network infrastructure. The U.S. government’s swift response in filing charges against the perpetrator demonstrates a commitment to holding cyber criminals accountable for their actions.<br /> <br /> Sophos, a leading provider of cybersecurity solutions, has since patched the zero-day vulnerability and advised its customers to update their firewalls to protect against similar attacks in the future. The incident serves as a stark reminder of the constant threat posed by malicious actors in cyberspace and the critical role of proactive cybersecurity measures in safeguarding against potential breaches.<br /> <br /> As the investigation unfolds, authorities are working diligently to uncover the motives behind the attack and prevent further exploitation of zero-day vulnerabilities. The case highlights the need for international cooperation in combatting cyber threats and enforcing accountability for malicious activities in the digital realm. With cyber attacks on the rise, it is imperative for organizations to prioritize cybersecurity and implement robust defense mechanisms to mitigate risks and protect sensitive data. March 31, 2025As a writer, creating original content is essential for establishing credibility and building a strong following. By crafting unique articles, you can showcase your expertise and offer valuable insights to your readers. This not only helps to attract new readers but also keeps existing ones engaged and coming back for more.<br /> <br /> One way to ensure your content is original is to conduct thorough research before writing. This will help you gather information and ideas from various sources, allowing you to create a well-rounded and informative piece. Additionally, it’s important to put your own spin on the topic, adding your unique perspective and voice to the article.<br /> <br /> Another key aspect of creating original content is to avoid plagiarism. This means refraining from directly copying and pasting text from other sources without proper attribution. Instead, use the information you gather from your research as a springboard for your own ideas and insights. This will help you create content that is truly original and showcases your creativity as a writer.<br /> <br /> Furthermore, engaging with your readers can also help you create original content. By listening to their feedback, questions, and suggestions, you can tailor your articles to meet their needs and interests. This not only helps you create content that resonates with your audience but also fosters a sense of community and connection with your readers.<br /> <br /> In conclusion, creating original content is crucial for establishing yourself as a credible and authoritative writer. By conducting thorough research, avoiding plagiarism, and engaging with your readers, you can create content that is truly unique and valuable. This will not only help you attract and retain readers but also establish you as a trusted source of information in your field. January 5, 2022How To Run Virus Scan in Command Prompt on Windows 10/11 May 22, 2024Cybersecurity Engineer (Principal) EPASS HB October 27, 2023Cybersecurity Operations Engineer
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Threat Advisories  CISA, FBI, and MS-ISAC Update Joint CSA on Progress Telerik Vulnerabilities
Threat Advisories

CISA, FBI, and MS-ISAC Update Joint CSA on Progress Telerik Vulnerabilities

Mister CybersecurityMister Cybersecurity—June 15, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

Siemens RUGGEDCOM APE1808 Devices Configured with Palo Alto Networks Virtual NGFW

April 25, 2024

GE Vernova Enervista UR Setup

February 17, 2026

MAR-10459736.r1.v1 WHIRLPOOL Backdoor | CISA

August 18, 2023

CISA Adds One Known Exploited ConnectWise Vulnerability, CVE-2024-1709, to Catalog

February 23, 2024


Today, CISA, the Federal Bureau of Investigation (FBI), and Multi-State Information Sharing and Analysis Center (MS-ISAC) released an update for joint Cybersecurity Advisory (CSA) Threat Actors Exploit Progress Telerik Vulnerability in U.S. Government IIS Server. 

This iteration of the CSA—now renamed Threat Actors Exploit Progress Telerik Vulnerabilities in Multiple U.S. Government IIS Servers—is based on the forensic analysis and identified exploitation of CVE-2017-9248 at an additional FCEB agency. Activity identified at this agency is separate from the CVE-2019-18935 exploitation listed in the original publication; analysis is provided as context for existing vulnerabilities within Telerik UI for ASP.NET AJAX. Further, this update provides a timetable and context of unattributed APT actor activity that highlights events, including identified malicious files. 

CISA, FBI, and MS-ISAC encourage network defenders to review this update and refer to the accompanying Malware Analysis Report, MAR-10443863-1.v1 CVE-2017-9248 Exploitation in U.S. Government IIS Server for analysis of the newly identified malicious files. 



Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Mister Cybersecurity

Siemens Solid Edge | CISA
​Siemens SICAM Q200 Devices | CISA
Related posts
  • Related posts
  • More from author
Threat Advisories

Contemporary Controls BASC 20T | CISA

April 9, 20260
Threat Advisories

GPL Odorizers GPL750 | CISA

April 9, 20260
Threat Advisories

CISA Adds One Known Exploited Vulnerability to Catalog

April 8, 20260
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity Resilience Specialist – Governance Risk and Compliance

April 11, 20260
Careers

Principal Cybersecurity – Cloud Security Strategy

April 11, 20260
Careers

Cybersecurity Engineer

April 11, 20260
Careers

Cybersecurity Engineer Principal

April 11, 20260
Careers

Cybersecurity Analyst III, Patch Management

April 11, 20260
Careers

Cybersecurity Engineering Support

April 11, 20260
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity Resilience Specialist – Governance Risk and Compliance
  • Principal Cybersecurity – Cloud Security Strategy
  • Cybersecurity Engineer
  • Cybersecurity Engineer Principal
  • Cybersecurity Analyst III, Patch Management

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures