The China-backed threat group often acts swiftly, going from initial access to compromise in just one day, a behavior atypical of cybercriminal groups.
Feb. 27, 2025
Weekly Edition
The latest news and insights for cybersecurity professionals
- The Latest News and Features -
The China-backed threat group often acts swiftly, going from initial access to compromise in just one day, a behavior atypical of cybercriminal groups.‎‎
Feed image
A patch bypass for a bug in the popular desktop emulator enables root-level privilege escalation and has no fix in sight.‎‎
Feed image
There's an untapped universe of exploitable drivers in the wild today. By exploiting just one of them, attackers were able to defeat security tools and infect Asian citizens with Gh0stRAT.‎‎
Feed image
In the wrong hands, the popular red-teaming tool can be made to access networks, escalate privileges, conduct reconnaissance, and disguise malicious activity as a simulated exercise.‎‎
Feed image
A new streaming series about a catastrophic, nationwide cyberattack against US critical infrastructure is about as believable as its main character: an honest, bipartisan, universally beloved politician.‎‎
Feed image
One of 2024's most active ransomware outfits has been asleep through early 2025, thanks to reality-show-style, behind-the-scenes drama.‎‎
Feed image
With Version 3, would-be phishers can cut and paste a big brand's URL into a template and let automation do the rest.‎‎
Feed image
The threat actors are exploiting noninteractive sign-ins, an authentication feature that security teams don't typically monitor.‎‎
Feed image
Cyberattackers believed to be affiliated with the state-sponsored threat group pulled off the largest crypto heist reported to date, stealing $1.5 billion from exchange Bybit. It was carried out by interfering with a routine transfer between wallets.‎‎
DR TECHNOLOGY
Feed image
A host of automated approaches identifies and remediates potential vulns while still retaining a role for security analysts to filter for context and business criticality.‎
THE EDGE
Feed image
OSPS Baseline provides a starting point for project owners and adopters to understand an open source project's security posture by outlining all the controls that have been applied.‎
DR GLOBAL
Feed image
Thai police said it was expecting to soon welcome 7,000 human trafficking victims, forced to work on cybercrime scams in call centers in Mynmar, in a first wave of people being freed from captivity.‎
VIRTUAL EVENT
Join us on March 20 for this all-day virtual event, designed to update cybersecurity teams on some of the most promising emerging cybersecurity technologies and provide advice on using them.
- Commentary -
Opinions from thought leaders around the cybersecurity industry
No matter the strategy, companies must approach securing unmanaged devices with sensitivity and respect for employee privacy.‎
Feeling creative? Have something to say about cybersecurity? Submit your caption and our panel of experts will reward the winner with a $25 gift card.‎
- Upcoming Events -
- More Resources -
- Elsewhere in Cyber This Week -
CYBERSECURITY DIVE
UNIT 42
CHECK POINT
- Do You Find Today’s Newsletter Helpful? -
Yes
Not sure
No
You received this message because you are subscribed to Dark Reading's Weekly newsletter.
If a friend forwarded you this message, sign up here to get it in your inbox. Thoughts about this newsletter? Give us feedback.
Copyright © 2025 TechTarget, Inc. or its subsidiaries. All rights reserved.
Operated by TechTarget, Inc. and its subsidiaries,
275 Grove Street, Newton, Massachusetts, 02466 US