News
World Cybersecurity News
The Hacker News
- Lotus Wiper Malware Targets Venezuelan Energy Systems in Destructive Attack April 22, 2026Cybersecurity researchers have discovered a previously undocumented data wiper that has been used in attacks targeting Venezuela at the end of last year and the start of 2026. Dubbed Lotus Wiper, the novel file wiper has been used in a destructive campaign targeting the energy and utilities sector in Venezuela, per findings from Kaspersky. "Two […]
- Toxic Combinations: When Cross-App Permissions Stack into Risk April 22, 2026On January 31, 2026, researchers disclosed that Moltbook, a social network built for AI agents, had left its database wide open, exposing 35,000 email addresses and 1.5 million agent API tokens across 770,000 active agents. The more worrying part sat inside the private messages. Some of those conversations held plaintext third-party credentials, including OpenAI API […]
- Microsoft Patches Critical ASP.NET Core CVE-2026-40372 Privilege Escalation Bug April 22, 2026Microsoft has released out-of-band updates to address a security vulnerability in ASP.NET Core that could allow an attacker to escalate privileges. The vulnerability, tracked as CVE-2026-40372, carries a CVSS score of 9.1 out of 10.0. It's rated Important in severity. An anonymous researcher has been credited with discovering and reporting the flaw. "Improper verification of […]
- Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles April 22, 2026Cybersecurity researchers have discovered a new variant of a known malware called LOTUSLITE that's distributed via a theme related to India's banking sector. "The backdoor communicates with a dynamic DNS-based command-and-control server over HTTPS and supports remote shell access, file operations, and session management, indicating a continued espionage-focused capability set rather than
- Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container Escape April 22, 2026A critical security vulnerability has been disclosed in a Python-based sandbox called Terrarium that could result in arbitrary code execution. The vulnerability, tracked as CVE-2026-5752, is rated 9.3 on the CVSS scoring system. "Sandbox escape vulnerability in Terrarium allows arbitrary code execution with root privileges on a host process via JavaScript prototype chain traversal," according […]
- SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation April 21, 2026Threat actors associated with The Gentlemen ransomware‑as‑a‑service (RaaS) operation have been observed attempting to deploy a known proxy malware called SystemBC. According to new research published by Check Point, the command-and-control (C2 or C&C) server linked to SystemBC has led to the discovery of a botnet of more than 1,570 victims. "SystemBC establishes SOCKS5 network […]
- 22 BRIDGE:BREAK Flaws Expose Thousands of Lantronix and Silex Serial-to-IP Converters April 21, 2026Cybersecurity researchers have identified 22 new vulnerabilities in popular models of serial-to-IP converters from Lantronix and Silex that could be exploited to hijack susceptible devices and tamper with data exchanged by them. The vulnerabilities have been collectively codenamed BRIDGE:BREAK by Forescout Research Vedere Labs, which identified nearly 20,000 Serial-to-Ethernet converters exposed
- Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023 April 21, 2026A third individual who was employed as a ransomware negotiator has pleaded guilty to conducting ransomware attacks against U.S. companies in 2023. Angelo Martino, 41, of Land O'Lakes, Florida, teamed up with the operators of the BlackCat ransomware starting in April 2023 to assist the e-crime gang in extracting higher amounts as ransoms. "Working as […]
- 5 Places where Mature SOCs Keep MTTR Fast and Others Waste Time April 21, 2026Security teams often present MTTR as an internal KPI. Leadership sees it differently: every hour a threat dwells inside the environment is an hour of potential data exfiltration, service disruption, regulatory exposure, and brand damage. The root cause of slow MTTR is almost never "not enough analysts." It is almost always the same structural problem: […]
- NGate Campaign Targets Brazil, Trojanizes HandyPay to Steal NFC Data and PINs April 21, 2026Cybersecurity researchers have discovered a new iteration of an Android malware family called NGate that has been found to abuse a legitimate application called HandyPay instead of NFCGate. "The threat actors took the app, which is used to relay NFC data, and patched it with malicious code that appears to have been AI-generated," ESET security researcher Lukáš Štefanko […]
Cybercrime Magazine
- Saudi Arabia’s Cybersecurity Startups Guard the Region’s Digital Shift April 22, 2026This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 22, 2026 – Read the full story in Cairo SCENE Digital transformation across the Middle East has accelerated rapidly in recent years, and cybersecurity has followed close behind. Saudi Arabia is one The post Saudi Arabia’s Cybersecurity Startups Guard the Region’s Digital […]Taylor Fox
- Best Cybercrime and Cybersecurity Podcasts for CISOs In 2026 April 20, 2026This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 20, 2026 – Listen to the podcast The Cybercrime Magazine Podcast tops Million Podcast’s curated list of the best 60 cybercrime podcasts to listen to in 2026. These podcasts are ranked based on their Apple The post Best Cybercrime and Cybersecurity Podcasts for CISOs In […]Taylor Fox
- He Pled Guilty To Blackmailing Apple. What Really Happened. April 17, 2026This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 17, 2026 – Listen to the podcast episode Kerem Albayrak from north London threatened to wipe 319 million accounts unless Apple gave him iTunes gift cards worth $100,000 (£76,000), BBC reported in a The post He Pled Guilty To Blackmailing Apple. What Really […]Amanada Glassner
- Stellar Cyber Unveils New Agentic AI Capabilities for the Human-Augmented Autonomous SOC April 15, 2026New automation and AI-driven triage capabilities dramatically reduce alert noise and accelerate investigations for modern security teams San Jose, Calif. – Apr. 16, 2026 As security operations teams struggle to keep pace with escalating alert volumes and increasingly automated attacks, Stellar Cyber just introduced new The post Stellar Cyber Unveils New Agentic AI Capabilities for […]Taylor Fox
- CISO Salaries In 2026: $150K to $1M; Stock Grants, Bonuses, Other Compensation April 15, 2026This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 15, 2026 – Read the full story from RSAC The top line on chief information security officer pay packages in 2026 is that CISOs are earning more than ever, writes Steve Morgan, founder The post CISO Salaries In 2026: $150K to $1M; Stock […]Taylor Fox
- Scamdemic: Over $1 Trillion Annually Lost To Online Fraud; AI Lends A Helping Hand April 14, 2026This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 14, 2026 – Read the full story in Time For the past few years, it’s escaped no one that levels of Internet and telephone fraud have skyrocketed. TIME reports that one in four The post Scamdemic: Over $1 Trillion Annually Lost To Online […]Taylor Fox
- Anthropic’s New Mythos Agent Has Created A Stir In The Cybersecurity Market April 13, 2026This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 13, 2026 – Read the full story in Barron’s Cybersecurity stocks could be set for a massive boost from risks tied to Anthropic’s latest advances in artificial intelligence, stemming from the limited The post Anthropic’s New Mythos Agent Has Created A Stir […]Taylor Fox
- Cybercrime Is An Industrialized Economy April 10, 2026This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 10, 2026 – Read the full story in BusinessWorld Cybercrime operates like a legitimate, profit-driven economy, writes Subhalakshmi Ganapathy, chief IT security evangelist at ManageEngine, in a BusinessWorld article. Organized groups mirror The post Cybercrime Is An Industrialized Economy appeared first on […]Taylor Fox
- Math Problem: Cybercrime Divided By Cybersecurity April 9, 2026This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 9, 2026 – Read the full story in Illumio “Gartner says we are all going to spend $240 billion USD (on cybersecurity this year), but Cybersecurity Ventures says that cybercrime losses (were predicted The post Math Problem: Cybercrime Divided By Cybersecurity appeared first […]Taylor Fox
- Yesterday’s Cybersecurity Won’t Work For Next Generation Cloud Attacks April 8, 2026This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 8, 2026 – Watch the YouTube video Why did Cybercrime Magazine meet up with Charlie Thomas, CEO at Mitiga, at RSAC Conference 2026? Because attackers will get in. Cloud, SaaS, AI, and identity The post Yesterday’s Cybersecurity Won’t Work For Next Generation Cloud […]Taylor Fox
Contact Proactive Cyber Security
Thank you for your interest in Proactive CS cyber security products and services. If you would like to learn more, or have questions and wish to speak with a representative, please take a moment to complete our form and we will contact you shortly.