A threat actor hacked a version of SonicWall's NetExtender SSL VPN application in an effort to trick users into installing a Trojanized version of the product.
June 25, 2025
Daily Edition
Today’s news and insights for cybersecurity professionals
- Today's News and Features -
TOP STORY
Feed image
A threat actor hacked a version of SonicWall's NetExtender SSL VPN application in an effort to trick users into installing a Trojanized version of the product.‎‎
Feed image
The campaign infected devices in the US and Southeast Asia to build an operational relay box (ORB) network for use as an extensive cyber-espionage infrastructure.‎‎
Feed image
The Canadian Center for Cybersecurity has confirmed that the Chinese state-sponsored cyber-threat actor targeted one of its telecommunications companies in February via a Cisco flaw, as part of global attack wave.‎‎
Feed image
America's largest steel producer initially disclosed the breach in May and took potentially affected systems offline to investigation the intrusion and contain any malicious activity.‎‎
DR GLOBAL
Feed image
Cybercrime accounts for more than 30% of all reported crime in East Africa and West Africa, with online scams, ransomware, business email compromise, and digital sextortion taking off.‎
DR TECHNOLOGY
Feed image
IBM is integrating its governance and AI security tools to address the risks associated with the AI adoption boom.‎
VIRTUAL EVENT
This virtual event happens June 26: As the cyber threat landscape evolves, so must the strategies and technologies to protect sensitive data in the enterprise. Zero trust and SASE approaches to securing networks are all the rage, so how do you harness them to fortify your environment? In this virtual event, we'll explore these security strategies as well as next-generation threat detection.
SPONSORED ARTICLE
Feed image
Password spraying is a rising threat to AD environments. Learn how to detect, prevent, and protect your users from these stealthy attacks.‎‎
- Commentary -
Opinions from thought leaders around the cybersecurity industry
Feed image
Trust no longer comes from network boundaries alone but from continuously validating and protecting data and identities at every interaction.‎‎
Feed image
In a market where security budgets flatten while threats accelerate, improving analyst throughput is fiscal stewardship.‎‎
- Upcoming Events -
- More Resources -
- Elsewhere in Cyber Today -
CYBERSECURITY DIVE
TRUSTWAVE
ZSCALER
- Do You Find Today’s Newsletter Helpful? -
Yes
Not sure
No
You received this message because you are subscribed to Dark Reading's Daily newsletter.
If a friend forwarded you this message, sign up here to get it in your inbox. Thoughts about this newsletter? Give us feedback.
Copyright © 2025 TechTarget, Inc. or its subsidiaries. All rights reserved.
Operated by TechTarget, Inc. and its subsidiaries,
275 Grove Street, Newton, Massachusetts, 02466 US