APT41, a Chinese state-sponsored threat actor also known as "Double Dragon," used Google Calendar as command-and-control infrastructure during a campaign last fall.
May 30, 2025
Daily Edition
Today’s news and insights for cybersecurity professionals
- Today's News and Features -
TOP STORY
Feed image
APT41, a Chinese state-sponsored threat actor also known as "Double Dragon," used Google Calendar as command-and-control infrastructure during a campaign last fall.‎‎‎
Feed image
Thousands of ASUS routers have been infected and are believed to be part of a wide-ranging ORB network affecting devices from Linksys, D-Link, QNAP, and Araknis Network.‎‎‎
Feed image
The outage reportedly hit 10 commercial customer consoles for SentinelOne's Singularity platform, including Singularity Endpoint, XDR, Cloud Security, Identity, Data Lake, RemoteOps, and more.‎‎‎
Feed image
The lingerie retailer isn't revealing much about the security incident it's dealing with but has brought in third-party experts to address the issue.‎‎‎
Feed image
While the botnet may not be completely automated, it uses certain tactics when targeting devices that indicate that it may, at the very least, be semiautomated.‎‎‎
Feed image
While the leak affected customer data, LexisNexis said in a notification letter that its products and systems were not compromised.‎‎‎
Feed image
Red Canary's MDR portfolio complements Zscaler's purchase last year of Israeli startup Avalor, which automates collection, curation, and enrichment of security data.‎‎‎
DR GLOBAL
Feed image
In addition to Coca-Cola, entities in Abu Dhabi, Jordan, Namibia, South Africa, and Switzerland are experiencing extortion attacks, all involving stolen SAP SuccessFactor data.‎‎
THE EDGE
Feed image
New guidance includes a list of 10 best practices to protect sensitive data throughout the AI lifecycle as well as addressing supply chain and data poisoning risks.‎‎
DR TECHNOLOGY
Feed image
At this year's Build developer conference, Microsoft reflects on what the company learned about securing features and writing secure code in the early 2000s.‎‎
Episode 6: In our latest podcast, threat hunters Ismael Valenzuela and Vitor Ventura share stories about the tricks they used to track down advanced persistent threat groups, and the surprises they discovered along the way. Listen now!
SPONSORED ARTICLE
Feed image
While AI fuels a new wave of more complex cyberattacks, LevelBlue research reveals the key to staying ahead requires embracing cyber resilience.‎‎‎
- Commentary -
Opinions from thought leaders around the cybersecurity industry
Feed image
By integrating intelligent network policies, zero-trust principles, and AI-driven insights, enterprises can create a robust defense against the next generation of cyber threats.‎‎‎
Feed image
Harnessing AI's full transformative potential safely and securely requires more than an incremental enhancement of existing cybersecurity practices. A Secure by Design approach represents the best path forward.‎‎‎
- Upcoming Events -
- More Resources -
- Elsewhere in Cyber Today -
VENTURE IN SECURITY
TECH TARGET SEARCH SECURITY
AWS SECURITY DIGEST
- Do You Find Today’s Newsletter Helpful? -
Yes
Not sure
No
You received this message because you are subscribed to Dark Reading's Daily newsletter.
If a friend forwarded you this message, sign up here to get it in your inbox. Thoughts about this newsletter? Give us feedback.
Copyright © 2025 TechTarget, Inc. or its subsidiaries. All rights reserved.
Operated by TechTarget, Inc. and its subsidiaries,
275 Grove Street, Newton, Massachusetts, 02466 US