Cybercrooks have drained DraftKings accounts of $300K in the past few days thanks to credential stuffing, just as the 2022 FIFA World Cup starts up.
Follow Dark Reading:
 November 23, 2022
LATEST SECURITY NEWS & COMMENTARY
DraftKings Account Takeovers Frame Sports-Betting Cybersecurity Dilemma
Cybercrooks have drained DraftKings accounts of $300K in the past few days thanks to credential stuffing, just as the 2022 FIFA World Cup starts up.
Google Blocks 231B Spam, Phishing Emails in Past 2 Weeks
Google Workspace's team is seeing a spike in phishing and spam hitting Gmail — up 10% in just the last two weeks.
Adversarial AI Attacks Highlight Fundamental Security Issues
An AI's "world" only includes the data on which it was trained, so it otherwise lacks context — opening the door for creative attacks from cyber adversaries.
Ducktail Cyberattackers Add WhatsApp to Facebook Business Attack Chain
The Vietnam-based financial cybercrime operation's primary goal is to push out fraudulent ads via compromised business accounts.
How Work From Home Shaped the Road to SASE for Enterprises
As SASE adoption grows, with its allure of simplified protection via one network and security experience for hybrid workers, remember: Have an overall plan, integrate and migrate to scale usage, and start small.
How Tech Companies Can Slow Down Spike in Breaches
Cybercrime continues to evolve — and shows no signs of slowing down.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Luna Moth's Novel, Malware-Free Extortion Campaign Takes Flight
Luna Moth is relying solely on call-back phishing, as well as legitimate tools, to steal data and extract ransoms from victims of all stripes in an expanding cyberattack effort.

Better Together: Why It's Time for Ops and Security to Converge
Threat actors are becoming only more sophisticated and determined.

Name That Toon: Fall Cleanup
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

MORE
EDITORS' CHOICE
Time to Get Kids Hacking: Our 2022 Holiday Gift Guide
Check out our slideshow of 10 fun games and toys that teach programming principles, electronics, and engineering concepts to get kids ready to hack the planet.
LATEST FROM THE EDGE

Cyber Due Diligence in M&As Uncovers Threats, Improves Valuations
To get the full picture, companies need to look into the cybersecurity history and practices of the business they're acquiring.
LATEST FROM DR TECHNOLOGY

Cybersecurity Pros Put Mastodon Flaws Under the Microscope
As the open source social media network blows up due to Twitter's troubles, researchers caution about vulnerabilities within the application.
WEBINARS
  • How to Protect Your Legacy Software Applications

    Agile development and continuous integration/continuous deployment have changed the game for application development practices, leading enterprises to "shift left" and build security into the software development lifecycle to catch any vulnerabilities before applications go into production. But what about ...

  • Developing and Testing an Effective Breach Response Plan

    When cyber attackers hit your network and your databases have been breached, do you know what you have to do and who to call? What do you tell your customers, employees, and other stakeholders, and when do you tell them? ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.