Since at least January, the threat actor has been employing multiple malware tools to steal information for potential future attacks against Taiwanese businesses and government agencies.
June 18, 2025
Daily Edition
Today’s news and insights for cybersecurity professionals
- Today's News and Features -
TOP STORY
Feed image
Since at least January, the threat actor has been employing multiple malware tools to steal information for potential future attacks against Taiwanese businesses and government agencies.‎‎
Feed image
A vulnerability in the popular Python-based tool for building AI agents and workflows is under active exploitation, allowing for full system compromise, DDoS attacks, and potential loss or theft of sensitive data‎‎
Feed image
Though its operations are running smoothly, the airline warned customers and employees to exercise caution when sharing personal information online.‎‎
DR GLOBAL
Feed image
The company acknowledged that cybercriminals had taken sensitive information on more than 8 million users, including names, phone numbers, car registration numbers, addresses, and emails.‎
Feed image
Sound suggestions on how to tackle four "quiet problems" that often slip through the security cracks.‎
DR TECHNOLOGY
Feed image
While ushering in "great operational value" for organizations, private 5G networks add yet another layer to CISOs' responsibilities.‎
VIRTUAL EVENT
TODAY, STARTING AT 11 EASTERN!: During this full-day virtual event, we'll explore the main vulnerabilities and exploits that lead to enterprise data breaches and the latest tools and best practices for conducting incident response. Attendees will gain insight on how to find and fix the security vulnerabilities before the attackers find them.
SPONSORED ARTICLE
Feed image
Blocking access to public AI applications is not enough to stop employees from putting data at risk.‎‎
- Commentary -
Opinions from thought leaders around the cybersecurity industry
Feed image
Cybercrime response needs more aggressive actions from those seeking to protect victims and pursue criminals.‎‎
Feed image
Third-party risks are increasing dramatically, requiring CISOs to evolve from periodic assessments to continuous monitoring and treating partner vulnerabilities as their own to enhance organizational resilience.‎‎
- Upcoming Events -
- More Resources -
- Elsewhere in Cyber Today -
CYBERSECURITY DIVE
TENABLE
MALWAREBYTES
- Do You Find Today’s Newsletter Helpful? -
Yes
Not sure
No
You received this message because you are subscribed to Dark Reading's Daily newsletter.
If a friend forwarded you this message, sign up here to get it in your inbox. Thoughts about this newsletter? Give us feedback.
Copyright © 2025 TechTarget, Inc. or its subsidiaries. All rights reserved.
Operated by TechTarget, Inc. and its subsidiaries,
275 Grove Street, Newton, Massachusetts, 02466 US