Funnull CDN rents IPs from legitimate cloud service providers and uses them to host criminal websites, continuously cycling cloud resources in and out of use and acquiring new ones to stay ahead of cyber-defender detection.
Feb. 6, 2025
Weekly Edition
The latest news and insights for cybersecurity professionals
Welcome to the new and improved Dark Reading newsletter, Dark Reading Weekly Edition.
Our redesigned newsletter features a clean and crisp format for readability, easier navigation, and more convenient access to the breaking cybersecurity news and in-depth insights you have come to expect from Dark Reading.
Each issue includes our latest news, analysis, and commentary, as well as our digital reports, research, and upcoming webinars and virtual events. In addition, we've added a new feature called Elsewhere in Cyber Today, where our editors curate for you their recommendations for relevant research and articles from other cybersecurity sites.
So take our Weekly Edition newsletter for a spin, and please let us know what you think of our new look and format. You can use the feedback options at the bottom of the newsletter.
Happy (Dark) Reading,
Kelly Jackson Higgins
Editor-in-Chief, Dark Reading
- The Latest News and Features -
Funnull CDN rents IPs from legitimate cloud service providers and uses them to host criminal websites, continuously cycling cloud resources in and out of use and acquiring new ones to stay ahead of cyber-defender detection.‎‎‎
Feed image
A sophisticated cyberattack campaign is targeting organizations that still rely on Active Directory Federation Services (ADFS) for authentication across applications and services.‎ ‎ ‎
Feed image
Now we know exactly how DeepSeek was designed to work, and we may even have a clue toward its highly publicized scandal with OpenAI.‎ ‎ ‎
Feed image
New research highlights how bad actors could abuse deleted AWS S3 buckets to create all sorts of mayhem, including a SolarWinds-style supply chain attack.‎ ‎ ‎
Feed image
Whether by intercepting its traffic or just giving it a little nudge, GitHub's AI assistant can be made to do malicious things it isn't supposed to.‎
Feed image
No ransomware groups have yet to claim responsibility for either attack, and both institutions have yet to reveal what may have been stolen.‎
THE EDGE
Feed image
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 gift card.‎
DR TECHNOLOGY
Feed image
Nine application security toolmakers band together to fork the popular Semgrep code-scanning project, touching off a controversy over access to features and fairness.‎
DR GLOBAL
Feed image
Amateurish financial scams are common across Africa, and Namibia's influential former first lady, Monica Geingos, has emerged as a particularly effective host body for these messages.‎
- Commentary -
Opinions from thought leaders around the cybersecurity industry
The rate of evolution has been glacial, but tools now understand cloud environments and can target Web applications.‎‎‎
Managing third-party risk in the SaaS era demands a proactive, data-driven approach beyond checkbox compliance.‎‎‎
- Upcoming Events -
- More Resources -
WHITE PAPER
- Elsewhere in Cyber This Week -
CYBERSECURITY DIVE
TENABLE
SENTINEL LABS
- Do You Find Today’s Newsletter Helpful? -
Yes
Not sure
No
You received this message because you are subscribed to Dark Reading's Weekly newsletter.
If a friend forwarded you this message, sign up here to get it in your inbox. Thoughts about this newsletter? Give us feedback.
Copyright © 2025 TechTarget, Inc. or its subsidiaries. All rights reserved.
Operated by TechTarget, Inc. and its subsidiaries,
275 Grove Street, Newton, Massachusetts, 02466 US