The threat group games IT help desks to gain entry into retailer networks, and signs show it has shifted its attention from the UK to US targets.
May 21, 2025
Daily Edition
Today’s news and insights for cybersecurity professionals
- Today's News and Features -
TOP STORY
Feed image
The threat group games IT help desks to gain entry into retailer networks, and signs show it has shifted its attention from the UK to US targets.‎‎
Feed image
An employee inadvertently downloaded a malicious version of the legitimate RVTools utility, which launched an investigation into an attempted supply chain attack aimed at delivering the recently revived initial-access loader.‎‎
Feed image
Since December 2023, the threat group has preyed on domains belonging to the US Centers for Disease Control and Prevention (CDC) and numerous other reputable organizations worldwide to redirect users to malicious sites.‎‎
DR GLOBAL
Feed image
China- and North Korea-aligned groups account for more than half of global attacks, and an increasing number of countries look to cyber to balance power in the region.‎
Feed image
Researchers discovered a phishing attack in the wild that takes multiple well-tread technologies like open source packages and AES encryption and combines them.‎
Feed image
A hacker exploiting the security flaw in the mobile provider's network could have potentially located a call recipient with accuracy of up to 100 square meters.‎‎
Feed image
Researchers noted that they found several similar websites, two of which are still operating and require the same kind of behavior on behalf of the victim.‎
THE EDGE
Feed image
Regeneron's planned acquisition of 23andMe raises significant privacy concerns as experts warn about the lack of comprehensive federal regulations governing the transfer of genetic information.‎
DR TECHNOLOGY
Feed image
Tenable One now pulls in data from AWS, Microsoft, and competitors to provide a holistic security view of an organization's attack surface.‎
SPONSORED ARTICLE
Feed image
Credential security platforms are emerging as a unified way to detect and respond to credential risks in real time as threats evolve.‎‎
- Commentary -
Opinions from thought leaders around the cybersecurity industry
Feed image
Organizations that stay ahead of attacks won't be the most compliant ones — they'll be the ones most honest about what actually works.‎‎
Feed image
If the Common Vulnerabilities and Exposures system continues to face uncertainty, the repercussions will build slowly, and eventually the cracks will become harder to contain.‎‎
- Upcoming Events -
- More Resources -
- Elsewhere in Cyber Today -
CISCO TALOS
TECH TARGET SEARCH SECURITY
CYBERSECURITY DIVE
- Do You Find Today’s Newsletter Helpful? -
Yes
Not sure
No
You received this message because you are subscribed to Dark Reading's Daily newsletter.
If a friend forwarded you this message, sign up here to get it in your inbox. Thoughts about this newsletter? Give us feedback.
Copyright © 2025 TechTarget, Inc. or its subsidiaries. All rights reserved.
Operated by TechTarget, Inc. and its subsidiaries,
275 Grove Street, Newton, Massachusetts, 02466 US