An executive order is targeting former Trump appointees, including former CISA director Chris Krebs and his current coworkers, in the latest in a series of directives against those who dissented against the president and his associates.
Apr. 11, 2025
Daily Edition
Today’s news and insights for cybersecurity professionals
- Today's News and Features -
TOP STORY
Feed image
An executive order is targeting former Trump appointees, including former CISA director Chris Krebs and his current coworkers, in the latest in a series of directives against those who dissented against the president and his associates.‎‎
Feed image
Security experts weigh in on the problem Salt Typhoon and its hacking of telecoms poses against the United States, including what the US should do and how defenders can protect themselves.‎‎
Feed image
Malicious packages lurking on open source repositories like npm have become less effective, so cyberattackers are using a new strategy: offering "patches" for locally installed programs.‎‎
Feed image
Darktrace researchers detailed "spam bombing," a technique in which threat actors bombard targets with spam emails as a pretense for activity like social engineering campaigns.‎‎
Feed image
Gladinet's platform is widely used among managed service providers, and a critical deserialization flaw could put MSP customers in jeopardy.‎
THE EDGE
Feed image
Secure by Design is an important step to reduce the number of vulnerabilities present originally, but is it progressing fast enough? According to security experts Chris Wysopal and Jason Healey, the landscape is improving.‎
DR TECHNOLOGY
Feed image
Managing permissions and authorizations across dozens or hundreds of cloud services and platforms poses significant headaches for companies. An open specification aims to change that.‎
SPONSORED ARTICLE
Feed image
A solid security data strategy is key to managing data overload, improving threat detection, and reducing breaches; it's not just adding more tools.‎‎
- Commentary -
Opinions from thought leaders around the cybersecurity industry
Feed image
Failing to distinguish between data privacy and data security leaves businesses vulnerable to regulatory scrutiny and the kinds of breaches that erode consumer trust overnight.‎‎
Feed image
With careful planning, the transition to post-quantum cryptography can significantly improve security and risk management for the present and future.‎‎
- Upcoming Events -
- More Resources -
- Elsewhere in Cyber Today -
ESET
FORRESTER
PALO ALTO NETWORKS
- Do You Find Today’s Newsletter Helpful? -
Yes
Not sure
No
You received this message because you are subscribed to Dark Reading's Daily newsletter.
If a friend forwarded you this message, sign up here to get it in your inbox. Thoughts about this newsletter? Give us feedback.
Copyright © 2025 TechTarget, Inc. or its subsidiaries. All rights reserved.
Operated by TechTarget, Inc. and its subsidiaries,
275 Grove Street, Newton, Massachusetts, 02466 US