News
World Cybersecurity News
The Hacker News
- Russian Star Blizzard Shifts Tactics to Exploit WhatsApp QR Codes for Credential Harvesting January 16, 2025The Russian threat actor known as Star Blizzard has been linked to a new spear-phishing campaign that targets victims' WhatsApp accounts, signaling a departure from its longstanding tradecraft in a likely attempt to evade detection. "Star Blizzard's targets are most commonly related to government or diplomacy (both incumbent and former position holders), defense policy or […]
- Ready to Simplify Trust Management? Join Free Webinar to See DigiCert ONE in Action January 16, 2025The digital world is exploding. IoT devices are multiplying like rabbits, certificates are piling up faster than you can count, and compliance requirements are tightening by the day. Keeping up with it all can feel like trying to juggle chainsaws while riding a unicycle. Traditional trust management? Forget it. It's simply not built for today's […]
- The $10 Cyber Threat Responsible for the Biggest Breaches of 2024 January 16, 2025You can tell the story of the current state of stolen credential-based attacks in three numbers: Stolen credentials were the #1 attacker action in 2023/24, and the breach vector for 80% of web app attacks. (Source: Verizon). Cybersecurity budgets grew again in 2024, with organizations now spending almost $1,100 per user (Source: Forrester). Stolen credentials […]
- New UEFI Secure Boot Vulnerability Could Allow Attackers to Load Malicious Bootkits January 16, 2025Details have emerged about a now-patched security vulnerability that could allow a bypass of the Secure Boot mechanism in Unified Extensible Firmware Interface (UEFI) systems. The vulnerability, assigned the CVE identifier CVE-2024-7344 (CVSS score: 6.7), resides in a UEFI application signed by Microsoft's "Microsoft Corporation UEFI CA 2011" third-party UEFI certificate, according to a new
- Researchers Find Exploit Allowing NTLMv1 Despite Active Directory Restrictions January 16, 2025Cybersecurity researchers have found that the Microsoft Active Directory Group Policy that's designed to disable NT LAN Manager (NTLM) v1 can be trivially bypassed by a misconfiguration. "A simple misconfiguration in on-premise applications can override the Group Policy, effectively negating the Group Policy designed to stop NTLMv1 authentications," Silverfort researcher Dor Segal said in a
- Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer January 16, 2025Threat actors have been observed concealing malicious code in images to deliver malware such as VIP Keylogger and 0bj3ctivity Stealer as part of separate campaigns. "In both campaigns, attackers hid malicious code in images they uploaded to archive[.]org, a file-hosting website, and used the same .NET loader to install their final payloads," HP Wolf Security […]
- Python-Based Malware Powers RansomHub Ransomware to Exploit Network Flaws January 16, 2025Cybersecurity researchers have detailed an attack that involved a threat actor utilizing a Python-based backdoor to maintain persistent access to compromised endpoints and then leveraged this access to deploy the RansomHub ransomware throughout the target network. According to GuidePoint Security, initial access is said to have been facilitated by means of a JavaScript malware downloaded […]
- Researcher Uncovers Critical Flaws in Multiple Versions of Ivanti Endpoint Manager January 16, 2025Ivanti has rolled out security updates to address several security flaws impacting Avalanche, Application Control Engine, and Endpoint Manager (EPM), including four critical bugs that could lead to information disclosure. All the four critical security flaws, rated 9.8 out of 10.0 on the CVSS scale, are rooted in EPM, and concern instances of absolute path […]
- Google Ads Users Targeted in Malvertising Scam Stealing Credentials and 2FA Codes January 15, 2025Cybersecurity researchers have alerted to a new malvertising campaign that's targeting individuals and businesses advertising via Google Ads by attempting to phish for their credentials via fraudulent ads on Google. "The scheme consists of stealing as many advertiser accounts as possible by impersonating Google Ads and redirecting victims to fake login pages," Jérôme Segura, senior […]
- Lazarus Group Targets Web3 Developers with Fake LinkedIn Profiles in Operation 99 January 15, 2025The North Korea-linked Lazarus Group has been attributed to a new cyber attack campaign dubbed Operation 99 that targeted software developers looking for freelance Web3 and cryptocurrency work to deliver malware. "The campaign begins with fake recruiters, posing on platforms like LinkedIn, luring developers with project tests and code reviews," Ryan Sherstobitoff, senior vice president […]
Cybercrime Magazine
- Dubai cybersecurity conference highlights urgent need for digital defense in UAE January 16, 2025This week in cybersecurity from the editors at Cybercrime Magazine –Read the Full Story in Zawya.com Sausalito, Calif. – Jan. 16, 2025 Cybersecurity experts gathered at a conference in Dubai this week to address the urgent challenges of securing businesses in an increasingly digital world. IBPC The post Dubai cybersecurity conference highlights urgent need for digital […]Taylor Fox
- How a British journalist exposed a hitman-for-hire website January 15, 2025This week in cybersecurity from the editors at Cybercrime Magazine –Listen to the Podcast Sausalito, Calif. – Jan. 15, 2025 Many people have idly fantasized about wanting to be rid of their ex, or boss, or perhaps a celebrity. But a few, motivated by hatred, The post How a British journalist exposed a hitman-for-hire website […]Taylor Fox
- Why Every Employee Needs Cybersecurity and AI Training Today January 14, 2025This week in cybersecurity from the editors at Cybercrime Magazine –Read the Full Story in OK! Magazine Sausalito, Calif. – Jan. 14, 2025 According to Cybersecurity Ventures, the global cost of cybercrime is projected to reach $10.5 trillion annually by 2025. Despite the growing sophistication of The post Why Every Employee Needs Cybersecurity and AI Training […]Taylor Fox
- Cyber Certainty: Threat Reduction For Business Leaders January 10, 2025This week in cybersecurity from the editors at Cybercrime Magazine –Read the Full Story in TechRound Sausalito, Calif. – Jan. 10, 2025 TechRound, the voice of UK startups, reports that cybercrime will cost the world more than $10 trillion annually by 2025, according to Cybersecurity Ventures. The post Cyber Certainty: Threat Reduction For Business Leaders appeared […]Taylor Fox
- Cybersecurity in 2025 — Challenges, Risks, and What Leaders Must Do January 9, 2025This week in cybersecurity from the editors at Cybercrime Magazine –Read the Full Story in Security Boulevard Sausalito, Calif. – Jan. 9, 2025 Every year brings new challenges — more threats, new techniques, more astute perpetrators, according to Rob Gurzeev, co-founder and CEO at CyCognito, The post Cybersecurity in 2025 — Challenges, Risks, and What […]Taylor Fox
- ‘Black Swan’ Event That Could Upend Life in 2025: The World’s Largest Cyberattack January 8, 2025This week in cybersecurity from the editors at Cybercrime Magazine –Read the Full Story in Politico Sausalito, Calif. – Jan. 8, 2025 15 futurists, foreign policy analysts and other prognosticators provide Politico readers some explosive potential scenarios for the new year. Gary Marcus, author of the The post ‘Black Swan’ Event That Could Upend Life in […]Taylor Fox
- Help Wanted: Data Scientists In The Cybersecurity Field January 7, 2025This week in cybersecurity from the editors at Cybercrime Magazine –Read the Full Medium Story Sausalito, Calif. – Jan. 7, 2025 Data science technology is about to revolutionize even the most traditional industries as it uses AI, Machine Learning, and Big Data, according to a story The post Help Wanted: Data Scientists In The Cybersecurity Field […]Amanada Glassner
- Cybersecurity Is One Of The Top 5 Skills For Job Seekers To Learn In 2025 January 6, 2025This week in cybersecurity from the editors at Cybercrime Magazine –Read the Full Story in Forbes Sausalito, Calif. – Jan. 6, 2025 A Forbes story reports that cybersecurity skills are highly coveted, as the digital landscape faces unprecedented threats and skyrocketing costs associated with cybercrimes. By 2025, The post Cybersecurity Is One Of The Top 5 Skills […]Taylor Fox
- IHAK: Capture Sector Growth In Cybersecurity January 3, 2025This week in cybersecurity from the editors at Cybercrime Magazine –Read the Full Seeking Alpha Story Sausalito, Calif. – Jan. 3, 2025 Cybercrime costs are rising. According to Cybersecurity Ventures, it is expected to reach $10.5 trillion annually by 2025, making cybersecurity a crucial investment sector. The post IHAK: Capture Sector Growth In Cybersecurity appeared first […]Taylor Fox
- 20 Best Cybercrime Blogs and Websites in 2025 January 2, 2025This week in cybersecurity from the editors at Cybercrime Magazine –Read the Full Feedspot Story Sausalito, Calif. – Jan. 2, 2025 FeedSpot named Cybercrime Magazine no. 1 on it’s list of 20 Best Cybercrime Blogs you should follow in 2025. The best Cybercrime blogs from thousands The post 20 Best Cybercrime Blogs and Websites in 2025 […]Taylor Fox
Contact Proactive Cyber Security
Thank you for your interest in Proactive CS cyber security products and services. If you would like to learn more, or have questions and wish to speak with a representative, please take a moment to complete our form and we will contact you shortly.