A group Google is tracking as UNC6040 has been tricking users into installing a malicious version of a Salesforce app to gain access to and steal data from the platform.
June 5, 2025
Daily Edition
Today’s news and insights for cybersecurity professionals
- Today's News and Features -
TOP STORY
Feed image
A group Google is tracking as UNC6040 has been tricking users into installing a malicious version of a Salesforce app to gain access to and steal data from the platform.‎‎‎
Feed image
Malicious RubyGems pose as a legitimate plug-in for the popular Fastlane rapid development platform in a geopolitically motivated attack with global supply chain reach.‎‎‎
Feed image
An international group of researchers found that simply rerecording deepfake audio with natural acoustics in the background allows it to bypass detection models at a higher-than-expected rate.‎‎‎
Feed image
A little more than three-quarters of these exposed devices are located in Europe, followed by Asia, with 17%.‎‎‎
DR GLOBAL
Feed image
ESET published research on the Iranian APT "BladedFeline," which researchers believe is a subgroup of the cyber-espionage entity APT34.‎
DR GLOBAL
Feed image
The United Nations, Carnegie Mellon University, and private organizations are all aiming to train the next generation of cybersecurity experts, boost economies, and disrupt pipelines to armed groups.‎
THE EDGE
Feed image
Organizations need to implement these five essential security controls to safely harness the power of autonomous AI agents while still protecting enterprise assets.‎
DR TECHNOLOGY
Feed image
At this year's Build developer conference, Microsoft reflected on what the company learned about securing features and writing secure code in the early 2000s.‎
VIRTUAL EVENT
Zero trust and secure access service edge (SASE) approaches to securing networks are all the rage, so how do you harness them to fortify your environment? In this virtual event on June 26, we’ll explore these security strategies as well as next-generation threat detection that employs valuable data analytics.
SPONSORED ARTICLE
Feed image
Failing to consider security and compliance when migrating to the cloud may increase your risk of falling victim to a data breach.‎‎‎
- Commentary -
Opinions from thought leaders around the cybersecurity industry
Feed image
By understanding the neurological realities of human attention, organizations can build more sustainable security operations that protect not only their digital assets but also the well-being of those who defend them.‎‎‎
Feed image
Hackers are exploiting trusted authentication flows — like Microsoft Teams and IoT logins — to trick users into handing over access tokens, bypassing MFA and slipping undetected into corporate networks.‎‎‎
- Upcoming Events -
- More Resources -
- Elsewhere in Cyber Today -
SOPHOS
MALWAREBYTES
CYBERSECURITY DIVE
- Do You Find Today’s Newsletter Helpful? -
Yes
Not sure
No
You received this message because you are subscribed to Dark Reading's Daily newsletter.
If a friend forwarded you this message, sign up here to get it in your inbox. Thoughts about this newsletter? Give us feedback.
Copyright © 2025 TechTarget, Inc. or its subsidiaries. All rights reserved.
Operated by TechTarget, Inc. and its subsidiaries,
275 Grove Street, Newton, Massachusetts, 02466 US