A slew of vulnerabilities, including a critical CVSS 9.8 that enables an attacker to generate the default admin password, affect hundreds of printer, scanner, and label-maker models made by manufacturer Brother.
June 26, 2025
Daily Edition
Today’s news and insights for cybersecurity professionals
- Today's News and Features -
TOP STORY
Feed image
A slew of vulnerabilities, including a critical CVSS 9.8 that enables an attacker to generate the default admin password, affect hundreds of printer, scanner, and label-maker models made by manufacturer Brother.‎‎
Feed image
The emerging group has already gotten its teeth into 16 victims since May with its double extortion tactics, claiming victims in 11 countries, including the US, Thailand, and Taiwan.‎‎
Feed image
The servers that connect AI with real-world data are occasionally wide-open channels for cyberattacks.‎‎
Feed image
The company has patched two vulnerabilities in its Graphical User Interface that would have allowed attackers to grab data from a user's input history feature.‎‎
Feed image
Though rudimentary and largely non-functional, the wryly named "Skynet" binary could be a harbinger of things to come on the malware front.‎‎
DR GLOBAL
Feed image
Israel's cyber pros are having to put theory into practice, as a notorious nation-state APT sponsored by Iran targets them with spear-phishing attacks.‎
DR TECHNOLOGY
Feed image
As the definition of machine identities broadens, AI agents working on behalf of the user and gaining access to various services blurs the lines of non-human identities even more.‎
THE EDGE
Feed image
Organizations are moving away from the public cloud and embracing a more hybrid approach due to big changes over the last five years.‎
PODCAST
Dark Reading Confidential Episode 7: Cyber experts Tom Parker and Jake Williams offer their views on the practical impact of cuts to the US Cybersecurity and Infrastructure Security Agency.
VIRTUAL EVENT
Today's virtual event starts at 11 Eastern: As the cyber threat landscape evolves, so must the strategies and technologies to protect sensitive data in the enterprise. Zero trust and SASE approaches to securing networks are all the rage, so how do you harness them to fortify your environment? In this virtual event, we'll explore these security strategies as well as next-generation threat detection.
SPONSORED ARTICLE
Feed image
LevelBlue research analyzes the rise of AI-powered threats, organizational preparedness, and the executive mindset around AI and cyber resilience.‎‎
- Commentary -
Opinions from thought leaders around the cybersecurity industry
Feed image
Malicious actors are exploiting AI-fabricated software components — presenting a major challenge for securing software supply chains.‎‎
Feed image
Trust no longer comes from network boundaries alone but from continuously validating and protecting data and identities at every interaction.‎‎
- Upcoming Events -
- More Resources -
- Elsewhere in Cyber Today -
TECHTARGET SEARCH SECURITY
SCHNEIER ON SECURITY
MALWAREBYTES
- Do You Find Today’s Newsletter Helpful? -
Yes
Not sure
No
You received this message because you are subscribed to Dark Reading's Daily newsletter.
If a friend forwarded you this message, sign up here to get it in your inbox. Thoughts about this newsletter? Give us feedback.
Copyright © 2025 TechTarget, Inc. or its subsidiaries. All rights reserved.
Operated by TechTarget, Inc. and its subsidiaries,
275 Grove Street, Newton, Massachusetts, 02466 US