The remediated flaw gave adversaries a way to maintain access to the app through password resets.
Apr. 16, 2025
Daily Edition
Today’s news and insights for cybersecurity professionals
- Today's News and Features -
TOP STORY
Feed image
The remediated flaw gave adversaries a way to maintain access to the app through password resets.‎‎
Feed image
Researchers at Abnormal Security said threat actors are using a legitimate presentation and graphic design tool named "Gamma" in phishing attacks.‎‎
Feed image
Sysdig researchers detailed an ongoing campaign from China-backed threat actor UNC5174, which is using open source hacking tools to stay under the radar.‎‎
Feed image
Russia-backed APT29's latest campaign once again uses malicious invites to wine-tasting events as its lure, but this time targets a different set of vintages — errr, victims — and delivers a novel backdoor, GrapeLoader.‎‎
Feed image
Customer data such as birth dates, credit card numbers, and driver's license information were stolen when threat actors exploited zero-day vulnerabilities in Cleo-managed file-transfer products.‎
Feed image
Bad bots are becoming increasingly difficult to detect as they more easily mimic human behaviors and utilize evasion techniques, researchers say.‎‎
THE EDGE
Feed image
Cybercriminals capitalize on tax preparation stress, technology sprawl, and lax communications. Accounting teams can't afford to treat cybersecurity as an afterthought.‎
SPONSORED ARTICLE
Feed image
Phishing remains a preferred method of breaching Microsoft 365, but cybercriminals are getting creative with Teams attacks.‎‎
- Commentary -
Opinions from thought leaders around the cybersecurity industry
Feed image
True security isn't about meeting deadlines — it's about mitigating risk in a way that aligns with business objectives while protecting against real-world threats.‎‎
Feed image
Some of the brightest minds in the industry will discuss how to strengthen cloud security.‎‎
- Upcoming Events -
- More Resources -
- Elsewhere in Cyber Today -
CYBERSECURITY DIVE
ELECTRONIC FRONTIER FOUNDATION
TECHTARGET SEARCH SECURITY
- Do You Find Today’s Newsletter Helpful? -
Yes
Not sure
No
You received this message because you are subscribed to Dark Reading's Daily newsletter.
If a friend forwarded you this message, sign up here to get it in your inbox. Thoughts about this newsletter? Give us feedback.
Copyright © 2025 TechTarget, Inc. or its subsidiaries. All rights reserved.
Operated by TechTarget, Inc. and its subsidiaries,
275 Grove Street, Newton, Massachusetts, 02466 US