Microsoft's May 2025 Patch Tuesday update also contains four other actively exploited zero-day security vulnerabilities, two publicly known bugs, and 12 critical patches.
May 14, 2025
Daily Edition
Today’s news and insights for cybersecurity professionals
- Today's News and Features -
TOP STORY
Feed image
Microsoft's May 2025 Patch Tuesday update also contains four other actively exploited zero-day security vulnerabilities, two publicly known bugs, and 12 critical patches.‎‎
Feed image
The EU cyber agency ENISA has launched its vulnerability database, the EUVD; security experts shared their thoughts regarding what this means for CVEs, as well as the larger conversation around how bugs are tracked.‎‎
Feed image
Tidrone concentrated on military entities and the satellite sector, using their associated service providers and ERP software to infect not just drones but all the entities that are part of their supply chains.‎‎
Feed image
Though the app claims to use end-to-end encryption, hackers have reportedly accessed archived data on the app's servers via a new vulnerability.‎‎‎‎
Feed image
For years, Google has faced several legal battles over privacy and lost, though this one takes the cake for biggest ever settlement against a Big Tech firm.‎‎‎‎
DR GLOBAL
Feed image
While hacktivists claimed more than 100 successful attacks against Indian government, education, and military targets, the attacks were overblown in most cases and often did not even happen.‎
THE EDGE
Feed image
Capital One executives share insights on how organizations should design their security programs, implement passwordless technologies, and reduce their attack surface.‎
DR TECHNOLOGY
Feed image
Fortra strengthens its endpoint-to-cloud security platform with the acquisition of Lookout's cloud application security broker, zero-trust network access, and secure Web gateway technologies.‎
SPONSORED ARTICLE
Feed image
Hackers are scouring day and night for vulnerabilities like VPNs and public-facing IPs to exploit — and AI is only making their lives easier.‎‎
- Commentary -
Opinions from thought leaders around the cybersecurity industry
Feed image
Why securing the inference chain is now the top priority for AI applications and infrastructure.‎‎‎‎
Feed image
Agentic-native startups threaten to reduce the zero-day problem to just a zero-hour issue. Of course, AI agents will accelerate offensive attacks as well.‎‎
- Upcoming Events -
- More Resources -
- Elsewhere in Cyber Today -
MICROSOFT
WORDFENCE
SENTINELONE
- Do You Find Today’s Newsletter Helpful? -
Yes
Not sure
No
You received this message because you are subscribed to Dark Reading's Daily newsletter.
If a friend forwarded you this message, sign up here to get it in your inbox. Thoughts about this newsletter? Give us feedback.
Copyright © 2025 TechTarget, Inc. or its subsidiaries. All rights reserved.
Operated by TechTarget, Inc. and its subsidiaries,
275 Grove Street, Newton, Massachusetts, 02466 US