Attackers can exploit a vulnerability present in the delegated Managed Service Account (dMSA) feature that fumbles permission handling and is present by default.
May 22, 2025
Daily Edition
Today’s news and insights for cybersecurity professionals
- Today's News and Features -
TOP STORY
Feed image
Attackers can exploit a vulnerability present in the delegated Managed Service Account (dMSA) feature that fumbles permission handling and is present by default.‎‎‎‎
Feed image
The FBI and partners have disrupted "the world's most popular malware," a sleek enterprise with thousands of moving parts, responsible for millions of cyberattacks in every part of the world.‎‎‎‎
Feed image
Even after a fix was issued, lingering prompt injection risks in GitLab's AI assistant might allow attackers to indirectly deliver developers malware, dirty links, and more.‎‎‎
Feed image
Wiz researchers found an opportunistic threat actor has been targeting vulnerable edge devices, including Ivanti VPNs and Palo Alto firewalls.‎‎‎‎
Feed image
Vixen Panda, Aquatic Panda — both Beijing-sponsored APTs and financially motivated criminal groups continued to pose the biggest threat to organizations in Central and South America last year, says CrowdStrike.‎‎‎‎
Feed image
The company expects it will continue to struggle with online disruptions until at least July, due to the attack.‎
Feed image
A number of major industrial organizations suffered ransomware attacks last quarter, such as PCB manufacturer Unimicron, appliance maker Presto, and more — a harbinger of a rapidly developing and diversifying threat landscape.‎‎‎‎
THE EDGE
Feed image
Gaps in laws, technology, and corporate accountability continue to put women's safety and privacy online at risk.‎‎‎
DR TECHNOLOGY
Feed image
Despite adding alignment training, guardrails, and filters, large language models continue to jump their imposed rails and give up secrets, make unfiltered statements, and provide dangerous information.‎‎‎
PODCAST
Episode 6: Threat hunters Ismael Valenzuela and Vitor Ventura share stories about the tricks they used to track down advanced persistent threat groups, and the surprises they discovered along the way. Listen now!
SPONSORED ARTICLE
Feed image
Agentic AI helps security teams work smarter by triaging alerts, hunting threats, and acting fast without needing predefined input.‎‎‎‎
- Commentary -
Opinions from thought leaders around the cybersecurity industry
Feed image
Merger and acquisition due diligence typically focuses on financials, legal risks, and operational efficiencies. Cybersecurity is often an afterthought — and that's a problem.‎‎‎‎
Feed image
Organizations that stay ahead of attacks won't be the most compliant ones — they'll be the ones most honest about what actually works.‎‎‎‎
- Upcoming Events -
- More Resources -
- Elsewhere in Cyber Today -
TECH TARGET SEARCH SECURITY
CYBERSECURITY DIVE
TRUSTWAVE
- Do You Find Today’s Newsletter Helpful? -
Yes
Not sure
No
You received this message because you are subscribed to Dark Reading's Daily newsletter.
If a friend forwarded you this message, sign up here to get it in your inbox. Thoughts about this newsletter? Give us feedback.
Copyright © 2025 TechTarget, Inc. or its subsidiaries. All rights reserved.
Operated by TechTarget, Inc. and its subsidiaries,
275 Grove Street, Newton, Massachusetts, 02466 US