One of 2024's most active ransomware outfits has been asleep through early 2025, thanks to reality-show-style, behind-the-scenes drama.
Feb. 24, 2025
Daily Edition
Today’s news and insights for cybersecurity professionals
- Today's News and Features -
One of 2024's most active ransomware outfits has been asleep through early 2025, thanks to reality-show-style, behind-the-scenes drama.‎‎
Feed image
In addition to using CVE-2018-0171 and other Cisco bugs to break into telecom networks, the China-sponsored APT is also using stolen login credentials for initial access.‎‎
Feed image
Estonia and Monaco back up their citizens' information to a data center in Luxembourg, while Singapore looks to India as its safe haven for data. But geopolitical challenges remain.‎‎
DR TECHNOLOGY
Feed image
The Cloud Key Management Service is part of Google's new road map for implementing the new NIST-based post-quantum cryptography (PQC) standards.‎
DR GLOBAL
Feed image
Thai police said it was expecting to soon welcome 7,000 human trafficking victims, forced to work on cybercrime scams in call centers in Mynmar, in a first wave of people being freed from captivity.‎
THE EDGE
Feed image
Excessive privileges and visibility gaps create a breeding ground for cyber threats.‎
SPONSORED ARTICLE
Feed image
Traditional vulnerability management is outdated for modern cyber threats. C-suites must adopt exposure management to align security with business priorities.‎‎
VIRTUAL EVENT
Join us on March 20 for this all-day virtual event, designed to update cybersecurity teams on some of the most promising emerging cybersecurity technologies and provide advice on using them.
- Commentary -
Opinions from thought leaders around the cybersecurity industry
Every organization should be exploring a layered approach in which artificial and human intelligences come together to form a rich, dynamic, and multifaceted deepfake defense strategy tailored to its needs.‎‎
By taking several proactive steps, boards can improve their organization's resilience against cyberattacks and protect their critical OT assets.‎‎
- Upcoming Events -
- More Resources -
- Elsewhere in Cyber Today -
CISA
CYFIRMA
SENTINELLABS
CYBERSECURITY DIVE
- Do You Find Today’s Newsletter Helpful? -
Yes
Not sure
No
You received this message because you are subscribed to Dark Reading's Daily newsletter.
If a friend forwarded you this message, sign up here to get it in your inbox. Thoughts about this newsletter? Give us feedback.
Copyright © 2025 TechTarget, Inc. or its subsidiaries. All rights reserved.
Operated by TechTarget, Inc. and its subsidiaries,
275 Grove Street, Newton, Massachusetts, 02466 US