In a cyber twist, attackers behind two of the campaigns are using the apps to redirect users to phishing and malware distribution sites.
Mar. 18, 2025
Daily Edition
Today’s news and insights for cybersecurity professionals
- Today's News and Features -
TOP STORY
In a cyber twist, attackers behind two of the campaigns are using the apps to redirect users to phishing and malware distribution sites.‎‎
Feed image
The researchers who discovered the initial assault warned that the simple, staged attack is just the beginning for advanced exploit sequences that will test cyber defenses in new and more difficult ways.‎‎
Feed image
A ransomware activity wave using the SocGholish MaaS framework for initial access also has affected banking and consulting firms in the US, Taiwan, and Japan since the beginning of the year.‎‎
Feed image
A new threat assessment from the Danish Civil Protection Authority (SAMSIK) warned of cyberattacks targeting the telecommunications sector after citing a wave of incidents hitting European organizations the past few years.‎‎
Feed image
The ClickFix attack tactic seems to be gaining traction among threat actors.‎‎
THE EDGE
Feed image
Inflation, cryptocurrency market volatility, and the ability to invest in defenses all influence the impact and severity of a ransomware attack, according to incident response efforts and ransomware negotiators.‎
DR TECHNOLOGY
Feed image
The chipmaker's Tiber Secure Federated AI service creates a secure tunnel between AI models on remote servers and data sources on origin systems.‎
SPONSORED ARTICLE
Feed image
Skuld Stealer is an example of malware created with open source that targets an open source platform, Discord.‎‎
- Commentary -
Opinions from thought leaders around the cybersecurity industry
Cybersecurity is not just a technical challenge but also a very human one. The more humans that organizations can get involved, the more diverse perspectives and experiences that can be tapped into.‎‎
To truly become indispensable in the boardroom, CISOs need to meet the dual demands of defending against sophisticated adversaries while leading resilience strategies.‎‎
- Upcoming Events -
- More Resources -
- Elsewhere in Cyber Today -
CYBERSECURITY DIVE
SANS
MALWAREBYTES
- Do You Find Today’s Newsletter Helpful? -
Yes
Not sure
No
You received this message because you are subscribed to Dark Reading's Daily newsletter.
If a friend forwarded you this message, sign up here to get it in your inbox. Thoughts about this newsletter? Give us feedback.
Copyright © 2025 TechTarget, Inc. or its subsidiaries. All rights reserved.
Operated by TechTarget, Inc. and its subsidiaries,
275 Grove Street, Newton, Massachusetts, 02466 US