Attackers can abuse malicious extensions to access critical data, including credentials, but organizations can reduce the risks by raising awareness and enforcing strict policy controls.
July 12, 2025
Features Edition
This week's insights for cybersecurity professionals
- This Week's Features -
Feed image
Attackers can abuse malicious extensions to access critical data, including credentials, but organizations can reduce the risks by raising awareness and enforcing strict policy controls.‎‎
Feed image
Within months of implementing anti-fraud measures and automation, Texas National Bank prevented more than $300,000 in check fraud.‎‎
PARTNER PERSPECTIVES BY ALGOSEC
Feed image
Unless organizations extend convergence to the tools, policies, and processes teams rely on, benefits will plateau — or worse, backfire.‎‎
Feed image
For browsers, exploitation is out — and getting users to compromise their own systems is in. Improved browser security has forced attackers to adapt their tactics, and they've accepted the challenge.‎‎
BLACK HAT USA 2025 PREVIEW
Feed image
A container escape flaw involving the NVIDIA Container Toolkit could have enabled a threat actor to access AI datasets across tenants.‎‎
Feed image
Startup Tumeryk's AI Trust scorecard finds Google Gemini Pro 2.5 as the most trustworthy, with OpenAI's GPT-4o mini a close second and DeepSeek and Alibaba Qwen scoring lowest.‎‎
PARTNER PERSPECTIVES BY BEYONDTRUST
Feed image
Recent cyberattacks on major UK retailers didn't start with a zero-day exploit — they started with a phone call.‎‎
- Hot Topics -
Opinions and news from thought leaders around the cybersecurity industry
Feed image
Following a breach at the country's top mobile provider that exposed 27 million records, the South Korean government imposed a small monetary penalty but stiff regulatory requirements.‎‎
Feed image
With certificate lifespans set to shrink by 2029, IT teams need to spend the next 100 days planning in order to avoid operational disruptions.‎‎
- Upcoming Events -
Live Virtual Event | Thursday, July 24th, 2025 | 11:00am - 3:00pm ET
- More Resources -
- Elsewhere in Cyber -
RECORDED FUTURE/INSIKT GROUP
GITHUB
MICAH LEE
- Do You Find Today’s Newsletter Helpful? -
Yes
Not sure
No
You received this message because you are subscribed to Dark Reading's Daily newsletter.
If a friend forwarded you this message, sign up here to get it in your inbox. Thoughts about this newsletter? Give us feedback.
Copyright © 2025 TechTarget, Inc. or its subsidiaries. All rights reserved.
Operated by TechTarget, Inc. and its subsidiaries,
275 Grove Street, Newton, Massachusetts, 02466 US