News
World Cybersecurity News
The Hacker News
- New SparrowDoor Backdoor Variants Found in Attacks on U.S. and Mexican Organizations March 26, 2025The Chinese threat actor known as FamousSparrow has been linked to a cyber attack targeting a trade group in the United States and a research institute in Mexico to deliver its flagship backdoor SparrowDoor and ShadowPad. The activity, observed in July 2024, marks the first time the hacking crew has deployed ShadowPad, a malware widely […]
- EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC Malware March 26, 2025The threat actor known as EncryptHub exploited a recently-patched security vulnerability in Microsoft Windows as a zero-day to deliver a wide range of malware families, including backdoors and information stealers such as Rhadamanthys and StealC. "In this attack, the threat actor manipulates .msc files and the Multilingual User Interface Path (MUIPath) to download and execute […]
- RedCurl Shifts from Espionage to Ransomware with First-Ever QWCrypt Deployment March 26, 2025The Russian-speaking hacking group called RedCurl has been linked to a ransomware campaign for the first time, marking a departure in the threat actor's tradecraft. The activity, observed by Romanian cybersecurity company Bitdefender, involves the deployment of a never-before-seen ransomware strain dubbed QWCrypt. RedCurl, also called Earth Kapre and Red Wolf, has a history of […]
- Malicious npm Package Modifies Local 'ethers' Library to Launch Reverse Shell Attacks March 26, 2025Cybersecurity researchers have discovered two malicious packages on the npm registry that are designed to infect another locally installed package, underscoring the continued evolution of software supply chain attacks targeting the open-source ecosystem. The packages in question are ethers-provider2 and ethers-providerz, with the former downloaded 73 times to date since it was published on
- Sparring in the Cyber Ring: Using Automated Pentesting to Build Resilience March 26, 2025“A boxer derives the greatest advantage from his sparring partner…” — Epictetus, 50–135 AD Hands up. Chin tucked. Knees bent. The bell rings, and both boxers meet in the center and circle. Red throws out three jabs, feints a fourth, and—BANG—lands a right hand on Blue down the center. This wasn’t Blue’s first day and […]
- Zero-Day Alert: Google Releases Chrome Patch for Exploit Used in Russian Espionage Attacks March 26, 2025Google has released out-of-band fixes to address a high-severity security flaw in its Chrome browser for Windows that has been exploited in the wild as part of attacks targeting organizations in Russia. The vulnerability, tracked as CVE-2025-2783, has been described as a case of "incorrect handle provided in unspecified circumstances in Mojo on Windows." Mojo […]
- How PAM Mitigates Insider Threats: Preventing Data Breaches, Privilege Misuse, and More March 26, 2025When people think of cybersecurity threats, they often picture external hackers breaking into networks. However, some of the most damaging breaches stem from within organizations. Whether through negligence or malicious intent, insiders can expose your organization to significant cybersecurity risks. According to Verizon's 2024 Data Breach Investigations Report, 57% of companies experience over
- Hackers Using E-Crime Tool Atlantis AIO for Credential Stuffing on 140+ Platforms March 26, 2025Threat actors are leveraging an e-crime tool called Atlantis AIO Multi-Checker to automate credential stuffing attacks, according to findings from Abnormal Security. Atlantis AIO "has emerged as a powerful weapon in the cybercriminal arsenal, enabling attackers to test millions of stolen credentials in rapid succession," the cybersecurity company said in an analysis. Credential stuffing is […]
- New Security Flaws Found in VMware Tools and CrushFTP — High Risk, No Workaround March 26, 2025Broadcom has issued security patches to address a high-severity security flaw in VMware Tools for Windows that could lead to an authentication bypass. Tracked as CVE-2025-22230, the vulnerability is rated 7.8 on the ten-point Common Vulnerability Scoring System (CVSS). "VMware Tools for Windows contains an authentication bypass vulnerability due to improper access control," Broadcom said […]
- Researchers Uncover ~200 Unique C2 Domains Linked to Raspberry Robin Access Broker March 25, 2025A new investigation has unearthed nearly 200 unique command-and-control (C2) domains associated with a malware called Raspberry Robin. "Raspberry Robin (also known as Roshtyak or Storm-0856) is a complex and evolving threat actor that provides initial access broker (IAB) services to numerous criminal groups, many of which have connections to Russia," Silent Push said in […]
Cybercrime Magazine
- Breaking The Code: The Complete List of Women Hackers in Hollywood Movies March 26, 2025A curated collection of films that are meant to inspire an underrepresented group in cybersecurity – Paul John Spaulding & Amanda Glassner Northport, N.Y. – Mar. 26, 2025 Cybercrime, if it were an economy, would be the third largest in the world after the U.S. The post Breaking The Code: The Complete List of Women […]Taylor Fox
- Human Error and The Financial Impact of Cybercrime March 26, 2025This week in cybersecurity from the editors at Cybercrime Magazine –Read the full story in TechBulllion Sausalito, Calif. – Mar. 26, 2025 The financial repercussions of cyber incidents can be staggering, affecting companies large and small. According to a report from Cybersecurity Ventures, global cybercrime damages are predicted The post Human Error and The Financial Impact of Cybercrime […]Taylor Fox
- Quantum Minute On The Cybercrime Radio Podcast March 25, 2025Brought to you by Applied Quantum and Secure Quantum The Quantum Minute is brought to you by Applied Quantum, a leading consultancy and solutions provider specializing in quantum computing, quantum cryptography, quantum communication, and quantum AI. D-Wave is the latest company to claim that they have achieved quantum supremacy. The post Quantum Minute On The Cybercrime Radio Podcast appeared […]Taylor Fox
- Most Ransomware Victims Who Pay Up Don’t Get Their Data Back March 25, 2025This week in cybersecurity from the editors at Cybercrime Magazine –Read the full story in SC Media Sausalito, Calif. – Mar. 25, 2025 It’s any IT professional’s worst nightmare, writes Trevor Dearing, an SC Media contributor. Someone has breached the network, locked users out of their The post Most Ransomware Victims Who Pay Up Don’t Get […]Taylor Fox
- Matthew Modine on AI, Cybercrime, Hacking, and the Internet March 24, 2025This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 24, 2025 –Watch the video on YouTube Matthew Modine “is one of the best, most adaptable film actors of his generation,” says The New York Times. Modine’s iconic portrayals in films such The post Matthew Modine on AI, Cybercrime, Hacking, and the […]Taylor Fox
- Small Business Alert: Top 10 Most Common Social Engineering Attacks March 21, 2025This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 21, 2025 –Read the full story in Tech Bullion According to Cybersecurity Ventures, the global cost of cybercrime is projected to reach $10.5 trillion annually by 2025, up from $3 trillion in The post Small Business Alert: Top 10 Most Common Social […]Taylor Fox
- Navigating MSSP Growth: Mergers, Acquisitions, and Strategic Differentiation March 20, 2025The Rise of Mergers and Acquisitions in the MSP and MSSP Industry – Jeff Hill, Senior Director Americas Service Providers and MSSP at Stellar Cyber San Jose, Calif. – Mar. 20, 2025 It’s an exciting time for service providers, with a lot of merger and The post Navigating MSSP Growth: Mergers, Acquisitions, and Strategic Differentiation […]Taylor Fox
- More Than Half Of Ransomware Attacks Bypass Traditional Detection Tools March 20, 2025This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 20, 2025 –Read the full story from Morphisec Global annual ransomware damages are projected to exceed $265 billion by 2031, according to Cybersecurity Ventures, highlighting the urgent need for businesses to The post More Than Half Of Ransomware Attacks Bypass Traditional […]Taylor Fox
- Help Wanted: Video Game Developers Interested In Cybersecurity March 19, 2025This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 19, 2025 –Listen to the full Interview How’s this for a resume? Adam Marre designed a video game when he was eight years old. Marre worked as a video game developer at The post Help Wanted: Video Game Developers Interested In Cybersecurity […]Taylor Fox
- Cybercrime Magazine YouTube Channel Exceeds 500,000 Subscribers March 18, 2025This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 18, 2025 The Cybercrime Magazine YouTube channel exceeded 500,000 subscribers today, up from the 100,000 we reported in our blog around 6 months ago when we earned a YouTube Silver Creator Award. According to The post Cybercrime Magazine YouTube Channel Exceeds 500,000 Subscribers appeared […]Taylor Fox
Contact Proactive Cyber Security
Thank you for your interest in Proactive CS cyber security products and services. If you would like to learn more, or have questions and wish to speak with a representative, please take a moment to complete our form and we will contact you shortly.