July 8, 2025
| Today’s news and insights for cybersecurity leaders
NOTE FROM THE EDITOR
Managing cyber risk without disrupting your business operations poses a major challenge for many organizations. As you can see from the news of a barrage of cyberattacks and threats in today’s issue, attackers are not letting up, and the stakes are getting even higher. Join us on Aug. 12 at 2 p.m. ET for a unique look at strategies for combating cyberattacks and navigating ever-evolving regulations and compliance requirements, all while managing an established portfolio of legacy technology that creates an ever-widening attack surface that CISOs must protect. You can register for the event here.
Hope to see you there. As always, thank you for reading!
|
|
David Jones
Reporter, Cybersecurity Dive
Email
|
An attack linked to the ransomware gang SafePay has disrupted certain fulfillment capabilities.
|
A new report shows that a select group of large companies uses technologies that the hacker group often targets.
|
A group of top cybersecurity and technology firms said the law provided critical protections for sharing essential vulnerability information.
|
Most identity security strategies focus on permissions—but attackers focus on paths. Explore how to uncover how attackers chain identities across systems to escalate access in
|
AI applications are 2.5x more likely to have critical vulnerabilities. Discover how pentesting can close your AI security gaps in this on-demand webinar.
|
|
From Our Library
Playbook
Custom content for Semgrep
|
Webinar - on demand
Custom content for Specter Ops
|
View all resources
What We’re Reading
Bleeping Computer
| |