An illegal gambling empire fueled by modern-day slavery is being propped up by high-profile sponsorships — and defended with sophisticated anti-detection software.
Follow Dark Reading:
 July 23, 2024
LATEST SECURITY NEWS & COMMENTARY
Chinese Forced-Labor Ring Sponsors Football Clubs, Hides Behind Stealth Tech
An illegal gambling empire fueled by modern-day slavery is being propped up by high-profile sponsorships — and defended with sophisticated anti-detection software.
Novel ICS Malware Sabotaged Water-Heating Services in Ukraine
Newly discovered "FrostyGoop" is the first ICS malware that can communicate directly with operational technology systems via the Modbus protocol.
Quantum Leap: Advanced Computing Is a Vulnerable Cyber Target
At Black Hat USA, researchers from Bitdefender and Transilvania Quantum will showcase how attackers can target quantum-based infrastructure.
Swipe Right for Data Leaks: Dating Apps Expose Location, More
Apps like Tinder, Bumble, Grindr, Badoo, OKCupid, MeetMe, and Hinge all have API vulnerabilities that expose sensitive user data, and six allow a threat actor to pinpoint exactly where someone is.
Under-Resourced Maintainers Pose Risk to Africa's Open Source Push
Many nations see open source software as a great equalizer, giving the Global South the tools necessary for sustainable development. But recent supply chain attacks highlight the need for security.
Kaspersky Is an Unacceptable Risk Threatening the Nation's Cyber Defense
As geopolitical tensions rise, foreign software presents a grave supply chain risk and an ideal attack vector for nation-state adversaries.
Russian Hacktivists Sanctioned for US Critical Infrastructure Attacks
"CARR" hackers have managed to gain control over ICS and SCADA systems in the US and Europe.
Teenage Scattered Spider Suspect Arrested in Global Cybercrime Sting
The authorities intend to send a message to these cybercrime groups that their criminal offenses and ransomware attacks are not worth the fallout.
(Sponsored Article) The Present and Future of Confidential Computing
Confidential computing protects sensitive information during processing and has recently expanded to include GPUs as well as CPUs.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
DHS Inspector General: Coast Guard Shortcomings Hinder US Maritime Security
Private sector organizations are "hesitant" to seek guidance from the Coast Guard, which isn't sufficiently equipped to help them yet.

In Cybersecurity, Mitigating Human Risk Goes Far Beyond Training
As threat actors get smarter about how they target employees, the onus is on organizations to create a strong line of defense — and the human element is a critical component.

Ransomware Has Outsized Impact on Gas, Energy & Utility Firms
Attackers are more likely to target critical infrastructure industries and, when they do, they cause more disruption and ask higher ransoms, with the median payment topping $2.5 million.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
Fallout From Faulty Friday CrowdStrike Update Persists
Historic IT outage expected to spur regulatory scrutiny, soul-searching over "monoculture" of IT infrastructure — and cyberattack threats.
LATEST FROM THE EDGE

Defending OT Requires Agility, Proactive Controls
As attackers set their sights on infrastructure, security teams need to reduce risk levels without compromising operational agility.
LATEST FROM DR TECHNOLOGY

Linx Security Launches With Identity Management Platform
The Israeli security startup's technology helps organizations map existing accounts and credentials to existing employees to identify those that should be removed.
LATEST FROM DR GLOBAL

Notorious Chinese Hacker Gang GhostEmperor Re-Emerges After 2 Years
After an extended period underground, the Chinese hackers have added a more sophisticated infection chain and additional EDR evasion techniques.
WEBINARS
  • Enhance Cloud Security with Cloud-Native Security

    In this webinar, learn how your current cloud security measures may be falling short as you shift to cloud-native, and what new tools and processes you will need to put in place to stay ahead of attackers.

  • The CIOs Guide to Enhancing GRC in 2024

    When structured correctly, Governance, Risk, and Compliance (GRC) can enable enterprises to align IT and business goals, while mitigating risks and abiding by industry and government requirements. Effectively manage your resources and unify your enterprise by utilizing emerging technology that ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.