The phishing operation is using Telegram groups to sell a phishing-as-a-service kit with customer service, a mascot, and infrastructure that requires little technical knowledge to install.
May 29, 2025
Daily Edition
Today’s news and insights for cybersecurity professionals
- Today's News and Features -
TOP STORY
Feed image
The phishing operation is using Telegram groups to sell a phishing-as-a-service kit with customer service, a mascot, and infrastructure that requires little technical knowledge to install.‎‎
Feed image
Researchers at Oasis Security say the problem has to do with OneDrive File Picker having overly broad permissions.‎‎‎‎
Feed image
Customers in parts of Wisconsin and Michigan could not make calls or send text messages for nearly a week after an incident on May 14, and service is still intermittent in some areas.‎‎‎‎
Feed image
Dark Reading is offering its readers the opportunity to tell us how we're doing via a new survey.‎‎‎‎
THE EDGE
Feed image
The Cybersecurity and Infrastructure Security Agency (CISA) and Australian Cyber Security Centre (ACSC) recommend that organizations conduct thorough testing and manage costs, which can be hefty, before implementing the platforms.‎
DR TECHNOLOGY
Feed image
Researchers are using quantum computers to generate keys that are truly random to strengthen data encryption.‎
PODCAST
Episode 6: In our latest podcast, threat hunters Ismael Valenzuela and Vitor Ventura share stories about the tricks they used to track down advanced persistent threat groups, and the surprises they discovered along the way.
SPONSORED ARTICLE
Feed image
Hackers are scouring day and night for vulnerabilities like VPNs and public-facing IPs to exploit — and AI is only making their lives easier.‎‎‎‎
- Commentary -
Opinions from thought leaders around the cybersecurity industry
Feed image
The latest cybersecurity awareness campaign asks users to pause for nine seconds before clicking — but this approach misplaces responsibility and ignores the real problems of system design.‎‎‎‎
Feed image
Harnessing AI's full transformative potential safely and securely requires more than an incremental enhancement of existing cybersecurity practices. A Secure by Design approach represents the best path forward.‎‎‎‎
- Upcoming Events -
- More Resources -
- Elsewhere in Cyber Today -
CHECKMARX
LINEAJE
IOT WORLD TODAY
- Do You Find Today’s Newsletter Helpful? -
Yes
Not sure
No
You received this message because you are subscribed to Dark Reading's Daily newsletter.
If a friend forwarded you this message, sign up here to get it in your inbox. Thoughts about this newsletter? Give us feedback.
Copyright © 2025 TechTarget, Inc. or its subsidiaries. All rights reserved.
Operated by TechTarget, Inc. and its subsidiaries,
275 Grove Street, Newton, Massachusetts, 02466 US