New details on the Cisco IOS XE vulnerability could help attackers develop a working exploit soon, researchers say.
June 5, 2025
Weekly Edition
The latest news and insights for cybersecurity professionals
- The Latest News and Features -
Feed image
New details on the Cisco IOS XE vulnerability could help attackers develop a working exploit soon, researchers say.‎‎‎
Feed image
The FBI and partners have disrupted "the world's most popular malware," a sleek enterprise with thousands of moving parts, responsible for millions of cyberattacks in every part of the world.‎‎‎
Feed image
A group Google is tracking as UNC6040 has been tricking users into installing a malicious version of a Salesforce app to gain access to and steal data from the platform.‎‎
Feed image
The data-stealing malware initially targeted users in Turkey but has since evolved into a global threat.‎‎
Feed image
The software company, which specializes in remote IT management, said a "sophisticated nation state actor" was behind the attack but provided few details.‎‎
Feed image
APT41, a Chinese state-sponsored threat actor also known as "Double Dragon," used Google Calendar as command-and-control infrastructure during a campaign last fall.‎‎
DR GLOBAL
Feed image
In addition to Coca-Cola, entities in Abu Dhabi, Jordan, Namibia, South Africa, and Switzerland are experiencing extortion attacks, all involving stolen SAP SuccessFactor data.‎‎
THE EDGE
Feed image
This information-sharing hub provided essential information to the emergency services sector on physical and cyber threats. Some say the timing is concerning.‎
DR TECHNOLOGY
Feed image
Researchers are using quantum computers to generate keys that are truly random to strengthen data encryption.‎
VIRTUAL EVENT
During this full-day virtual event on June 18, we'll explore the main vulnerabilities and exploits that lead to enterprise data breaches and the latest tools and best practices for conducting incident response. Attendees will gain insight on how to find and fix the security vulnerabilities before the attackers find them.
- Commentary -
Opinions from thought leaders around the cybersecurity industry
Feed image
AI tools shook up development. Now, product security must change too.‎‎
Feed image
By integrating intelligent network policies, zero-trust principles, and AI-driven insights, enterprises can create a robust defense against the next generation of cyber threats.‎‎
- Upcoming Events -
- More Resources -
- Elsewhere in Cyber This Week -
SOPHOS
RAPID7
CYBERSECURITY DIVE
- Do You Find Today’s Newsletter Helpful? -
Yes
Not sure
No
You received this message because you are subscribed to Dark Reading's Weekly newsletter.
If a friend forwarded you this message, sign up here to get it in your inbox. Thoughts about this newsletter? Give us feedback.
Copyright © 2025 TechTarget, Inc. or its subsidiaries. All rights reserved.
Operated by TechTarget, Inc. and its subsidiaries,
275 Grove Street, Newton, Massachusetts, 02466 US