The emerging threat group attacks the supply chain via weaponized repositories posing as legitimate pen-testing suites and other tools that are poisoned with malware.
June 19, 2025
Weekly Edition
The latest news and insights for cybersecurity professionals
- The Latest News and Features -
Feed image
The emerging threat group attacks the supply chain via weaponized repositories posing as legitimate pen-testing suites and other tools that are poisoned with malware.‎
Feed image
A vulnerability in the popular Python-based tool for building AI agents and workflows is under active exploitation, allowing for full system compromise, DDoS attacks, and potential loss or theft of sensitive data‎
Feed image
The Android malware is targeting Turkish financial institutions, completely taking over legitimate banking and crypto apps by creating an isolated virtualized environment on a device.‎
Feed image
Since at least January, the threat actor has been employing multiple malware tools to steal information for potential future attacks against Taiwanese businesses and government agencies.‎
Feed image
Researchers discovered a large-scale campaign using the open source penetration-testing framework that has targeted more than 80,000 Microsoft accounts.‎
Feed image
Researchers at Aim Security disclosed a Microsoft Copilot vulnerability of critical severity this week that could have enabled sensitive data exfiltration via prompt injection attacks.‎
Feed image
A string of threat-actor OpSec failures have yielded unexpected windfalls for security researchers and defenders.‎
DR GLOBAL
Feed image
The company acknowledged that cybercriminals had taken sensitive information on more than 8 million users, including names, phone numbers, car registration numbers, addresses, and emails.‎
DR TECHNOLOGY
Feed image
While ushering in "great operational value" for organizations, private 5G networks add yet another layer to CISOs' responsibilities.‎
THE EDGE
Feed image
Many cybersecurity professionals still don't feel comfortable admitting when they need a break. And the impact goes beyond being overworked.‎
VIRTUAL EVENT
Virtual event happens June 26: As the cyber threat landscape evolves, so must the strategies and technologies to protect sensitive data in the enterprise. Zero trust and SASE approaches to securing networks are all the rage, so how do you harness them to fortify your environment? In this virtual event, we'll explore these security strategies as well as next-generation threat detection.
SURVEY
Feed image
Dark Reading is offering its readers the opportunity to tell us how we're doing via a new survey.‎
- Commentary -
Opinions from thought leaders around the cybersecurity industry
Feed image
To truly future-proof your cybersecurity approach, it's vital to ensure that your security program is flexible and adaptable to both current and future business demands.‎
Feed image
Third-party risks are increasing dramatically, requiring CISOs to evolve from periodic assessments to continuous monitoring and treating partner vulnerabilities as their own to enhance organizational resilience.‎
- Upcoming Events -
- More Resources -
- Elsewhere in Cyber This Week -
RECORDED FUTURE
TENABLE
TECH TARGET SEARCH WINDOWS SERVER
- Do You Find Today’s Newsletter Helpful? -
Yes
Not sure
No
You received this message because you are subscribed to Dark Reading's Weekly newsletter.
If a friend forwarded you this message, sign up here to get it in your inbox. Thoughts about this newsletter? Give us feedback.
Copyright © 2025 TechTarget, Inc. or its subsidiaries. All rights reserved.
Operated by TechTarget, Inc. and its subsidiaries,
275 Grove Street, Newton, Massachusetts, 02466 US