An illegal gambling empire fueled by modern-day slavery is being propped up by high-profile sponsorships — and defended with sophisticated anti-detection software.
| LATEST SECURITY NEWS & COMMENTARY | Chinese Forced-Labor Ring Sponsors Football Clubs, Hides Behind Stealth Tech An illegal gambling empire fueled by modern-day slavery is being propped up by high-profile sponsorships — and defended with sophisticated anti-detection software. Novel ICS Malware Sabotaged Water-Heating Services in Ukraine Newly discovered "FrostyGoop" is the first ICS malware that can communicate directly with operational technology systems via the Modbus protocol. Quantum Leap: Advanced Computing Is a Vulnerable Cyber Target At Black Hat USA, researchers from Bitdefender and Transilvania Quantum will showcase how attackers can target quantum-based infrastructure. Swipe Right for Data Leaks: Dating Apps Expose Location, More Apps like Tinder, Bumble, Grindr, Badoo, OKCupid, MeetMe, and Hinge all have API vulnerabilities that expose sensitive user data, and six allow a threat actor to pinpoint exactly where someone is. Under-Resourced Maintainers Pose Risk to Africa's Open Source Push Many nations see open source software as a great equalizer, giving the Global South the tools necessary for sustainable development. But recent supply chain attacks highlight the need for security. Kaspersky Is an Unacceptable Risk Threatening the Nation's Cyber Defense As geopolitical tensions rise, foreign software presents a grave supply chain risk and an ideal attack vector for nation-state adversaries. Russian Hacktivists Sanctioned for US Critical Infrastructure Attacks "CARR" hackers have managed to gain control over ICS and SCADA systems in the US and Europe. Teenage Scattered Spider Suspect Arrested in Global Cybercrime Sting The authorities intend to send a message to these cybercrime groups that their criminal offenses and ransomware attacks are not worth the fallout. (Sponsored Article) The Present and Future of Confidential Computing Confidential computing protects sensitive information during processing and has recently expanded to include GPUs as well as CPUs. MORE NEWS / MORE COMMENTARY | | | PRODUCTS & RELEASES | Threat Hunting Market Worth $6.9B by 2029 Cloud Security Alliance Introduces Certificate of Cloud Security Knowledge Seemplicity 2024 Remediation Operations Report: Rising Exposure Management Risk Two Foreign Nationals Plead Guilty to Participating in LockBit Ransomware Group Check Point Research Reports Highest Increase of Global Cyber Attacks Seen in Last Two Years EC-Council Democratizes Hands-On Cybersecurity Training With 8 Cyber Courses MORE PRODUCTS & RELEASES |
| | WEBINARS | Enhance Cloud Security with Cloud-Native Security In this webinar, learn how your current cloud security measures may be falling short as you shift to cloud-native, and what new tools and processes you will need to put in place to stay ahead of attackers. The CIOs Guide to Enhancing GRC in 2024 When structured correctly, Governance, Risk, and Compliance (GRC) can enable enterprises to align IT and business goals, while mitigating risks and abiding by industry and government requirements. Effectively manage your resources and unify your enterprise by utilizing emerging technology that ... | View More Dark Reading Webinars >> | |
| | | |
|
Dark Reading Daily -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Daily Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|