The security software maker said the vulnerabilities in Endpoint Manager Mobile have been exploited in the wild against "a very limited number of customers" — for now — and stem from open source libraries.
May 15, 2025
Daily Edition
Today’s news and insights for cybersecurity professionals
- Today's News and Features -
TOP STORY
Feed image
The security software maker said the vulnerabilities in Endpoint Manager Mobile have been exploited in the wild against "a very limited number of customers" — for now — and stem from open source libraries.‎‎
Feed image
Salary savings come with hidden costs, including insider threats and depleted cybersecurity defenses, conveying advantages to skilled adversaries, experts argue.‎‎
Feed image
A new study by researchers at Princeton University and Sentient shows it's surprisingly easy to trigger malicious behavior from AI agents by implanting fake "memories" into the data they rely on for making decisions.‎‎
Feed image
The British retailer said no account passwords were compromised in last month's cyberattack, but the company will require customers to reset passwords "for extra peace of mind."‎‎
Feed image
The acquisition will enhance Orca's CNAPP offering with autonomous vulnerability remediation and prevention technologies from Opus.‎‎
DR TECHNOLOGY
Feed image
The acquisition will enhance Orca's CNAPP offering with autonomous vulnerability remediation and prevention technologies from Opus.‎
THE EDGE
Feed image
Organizations face the complex challenge of accurately measuring their cyber risk across multiple variables. Resilience's risk calculator tool can help organizations measure their cyber risk based on their own factors so that they can make informed decisions about their security posture.‎
SPONSORED ARTICLE
Feed image
Credential security platforms are emerging as a unified way to detect and respond to credential risks in real time as threats evolve.‎‎
- Commentary -
Opinions from thought leaders around the cybersecurity industry
Feed image
Some members of Congress seem more intent on grabbing headlines than actually working to make America more cyber secure.‎‎
Feed image
Why securing the inference chain is now the top priority for AI applications and infrastructure.‎‎
- Upcoming Events -
- More Resources -
- Elsewhere in Cyber Today -
ELLIPTIC
CYBERSECURITY DIVE
MALWAREBYTES
- Do You Find Today’s Newsletter Helpful? -
Yes
Not sure
No
You received this message because you are subscribed to Dark Reading's Daily newsletter.
If a friend forwarded you this message, sign up here to get it in your inbox. Thoughts about this newsletter? Give us feedback.
Copyright © 2025 TechTarget, Inc. or its subsidiaries. All rights reserved.
Operated by TechTarget, Inc. and its subsidiaries,
275 Grove Street, Newton, Massachusetts, 02466 US