The company has patched two vulnerabilities in its Graphical User Interface that would have allowed attackers to grab data from a user's input history feature.
June 26, 2025
Weekly Edition
The latest news and insights for cybersecurity professionals
- The Latest News and Features -
Feed image
The company has patched two vulnerabilities in its Graphical User Interface that would have allowed attackers to grab data from a user's input history feature.‎‎
Feed image
As Iran closes its cyberspace to the outside world, hacktivists are picking sides, while attacks against Israel surge and spread across the region.‎‎
Feed image
A slew of vulnerabilities, including a critical CVSS 9.8 that enables an attacker to generate the default admin password, affect hundreds of printer, scanner, and label-maker models made by manufacturer Brother.‎‎
Feed image
A threat actor hacked a version of SonicWall's NetExtender SSL VPN application in an effort to trick users into installing a Trojanized version of the product.‎‎
Feed image
An AI security researcher has developed a proof of concept that uses subtle, seemingly benign prompts to get GPT and Gemini to generate inappropriate content.‎‎
Feed image
As geopolitical tensions rise, the use of cyber operations and hacktivists continues to grow, with the current conflict between Israel and Iran showing the new face of cyber-augmented war.‎‎
DR GLOBAL
Feed image
Cybercrime accounts for more than 30% of all reported crime in East Africa and West Africa, with online scams, ransomware, business email compromise, and digital sextortion taking off.‎‎
THE EDGE
Feed image
Organizations are moving away from the public cloud and embracing a more hybrid approach due to big changes over the last five years.‎
DR TECHNOLOGY
Feed image
As the definition of machine identities broadens, AI agents working on behalf of the user and gaining access to various services blurs the lines of non-human identities even more.‎
PODCAST
Dark Reading Confidential Episode 7: Cyber experts Tom Parker and Jake Williams offer their views on the practical impact of cuts to the US Cybersecurity and Infrastructure Security Agency. Listen now!
VIRTUAL EVENT
Our virtual event happens today at 11 Eastern: As the cyber threat landscape evolves, so must the strategies and technologies to protect sensitive data in the enterprise. Zero trust and SASE approaches to securing networks are all the rage, so how do you harness them to fortify your environment? In this virtual event, we'll explore these security strategies as well as next-generation threat detection.
- Commentary -
Opinions from thought leaders around the cybersecurity industry
Feed image
In a market where security budgets flatten while threats accelerate, improving analyst throughput is fiscal stewardship.‎‎
Feed image
Trust no longer comes from network boundaries alone but from continuously validating and protecting data and identities at every interaction.‎‎
- Upcoming Events -
- More Resources -
- Elsewhere in Cyber This Week -
SCHNEIER ON SECURITY
CYBERSECURITY DIVE
WORDFENCE
- Do You Find Today’s Newsletter Helpful? -
Yes
Not sure
No
You received this message because you are subscribed to Dark Reading's Weekly newsletter.
If a friend forwarded you this message, sign up here to get it in your inbox. Thoughts about this newsletter? Give us feedback.
Copyright © 2025 TechTarget, Inc. or its subsidiaries. All rights reserved.
Operated by TechTarget, Inc. and its subsidiaries,
275 Grove Street, Newton, Massachusetts, 02466 US