Mandiant researchers found the routers of several unnamed organizations (likely telcos and ISPs) were hacked by UNC3886, and contained a custom backdoor called "TinyShell."
Mar. 13, 2025
Daily Edition
Today’s news and insights for cybersecurity professionals
- Today's News and Features -
TOP STORY
Mandiant researchers found the routers of several unnamed organizations (likely telcos and ISPs) were hacked by UNC3886, and contained a custom backdoor called "TinyShell."‎‎
Feed image
A threat actor leveraged the vulnerability in an "extremely sophisticated" attack on targeted iOS users, the company says.‎‎
Feed image
The prolonged attack, which lasted 300+ days, is the first known compromise of the US electric grid by the Voltzite subgroup of the Chinese APT; during it, the APT attempted to exfiltrate critical OT infrastructure data.‎‎
Feed image
In the past, the vulnerability was exploited to drop Mirai botnet malware. Today, it's being used once more for another botnet campaign with its own malware.‎‎
Feed image
Researchers from Symantec showed how OpenAI's Operator agent, currently in research preview, can be used to construct a basic phishing attack from start to finish.‎
DR GLOBAL
Feed image
Following increasing attacks on healthcare organizations, the United Arab Emirates has refined its regulatory strategy for improving cybersecurity in healthcare.‎
THE EDGE
Feed image
The National Institute of Standards and Technology (NIST) has released updated differential privacy guidelines for organizations to follow to protect personally identifiable information when sharing data.‎
DR TECHNOLOGY
Feed image
The new The F5 Application Delivery Controller and Security Platform combines BIG-IP, NGNIX and Distributed Cloud Services and new AI Gateway and AI Assistants.‎
SPONSORED ARTICLE
Feed image
Staying ahead of adversaries in the AI era requires embracing an innovative SIEM that transforms the way security operations centers function.‎‎
- Commentary -
Opinions from thought leaders around the cybersecurity industry
To truly become indispensable in the boardroom, CISOs need to meet the dual demands of defending against sophisticated adversaries while leading resilience strategies.‎‎
In the battle against two-minute micro-attacks that can knock out critical communication services, the difference between success and failure can literally come down to seconds.‎‎
- Upcoming Events -
- More Resources -
- Elsewhere in Cyber Today -
LOOKOUT
TECHTARGET SEARCH SECURITY
MALWAREBYTES
- Do You Find Today’s Newsletter Helpful? -
Yes
Not sure
No
You received this message because you are subscribed to Dark Reading's Daily newsletter.
If a friend forwarded you this message, sign up here to get it in your inbox. Thoughts about this newsletter? Give us feedback.
Copyright © 2025 TechTarget, Inc. or its subsidiaries. All rights reserved.
Operated by TechTarget, Inc. and its subsidiaries,
275 Grove Street, Newton, Massachusetts, 02466 US