The emerging threat group attacks the supply chain via weaponized repositories posing as legitimate pen-testing suites and other tools that are poisoned with malware.
June 17, 2025
Daily Edition
Today’s news and insights for cybersecurity professionals
- Today's News and Features -
TOP STORY
Feed image
The emerging threat group attacks the supply chain via weaponized repositories posing as legitimate pen-testing suites and other tools that are poisoned with malware.‎‎
Feed image
Unlike typical data-stealing malware, this attack tool targets data specific to corporate and cloud infrastructures in order to execute supply chain attacks.‎‎
Feed image
Journalists' Microsoft accounts were breached, which would have given attackers access to emails of staff reporters covering national security, economic policy, and China.‎‎
Feed image
The threat of wiping files and servers clean gives Anubis affiliates yet another way to leverage ransomware victims who may be hesitant to pay to get their data back, Trend Micro said.‎‎
THE EDGE
Feed image
When security becomes a performance, the fallout isn't just technical. It's organizational.‎
DR TECHNOLOGY
Feed image
At this year's Build developer conference, Microsoft reflected on what the company learned about securing features and writing secure code in the early 2000s.‎
VIRTUAL EVENT
During this full-day virtual event on June 18, we'll explore the main vulnerabilities and exploits that lead to enterprise data breaches and the latest tools and best practices for conducting incident response. Attendees will gain insight on how to find and fix the security vulnerabilities before the attackers find them.
Feed image
Failing to consider security and compliance when migrating to the cloud may increase your risk of falling victim to a data breach.‎‎
- Commentary -
Opinions from thought leaders around the cybersecurity industry
Feed image
Third-party risks are increasing dramatically, requiring CISOs to evolve from periodic assessments to continuous monitoring and treating partner vulnerabilities as their own to enhance organizational resilience.‎‎
Feed image
This alignment makes a successful CISO, but creating the same sentiment across business leadership creates a culture of commitment and greatly contributes to achieving goals.‎‎
- Upcoming Events -
- More Resources -
- Elsewhere in Cyber Today -
THE RECORD
ELECTRONIC FRONTIER FOUNDATION
TRUSTWAVE
- Do You Find Today’s Newsletter Helpful? -
Yes
Not sure
No
You received this message because you are subscribed to Dark Reading's Daily newsletter.
If a friend forwarded you this message, sign up here to get it in your inbox. Thoughts about this newsletter? Give us feedback.
Copyright © 2025 TechTarget, Inc. or its subsidiaries. All rights reserved.
Operated by TechTarget, Inc. and its subsidiaries,
275 Grove Street, Newton, Massachusetts, 02466 US