A crime syndicate based in Russia steals millions of dollars from credit card companies using fake dating and porn sites on hundreds of domains to rack up fraudulent charges.
Follow Dark Reading:
 September 27, 2022
LATEST SECURITY NEWS & COMMENTARY
Fake Sites Siphon Millions of Dollars in 3-Year Scam
A crime syndicate based in Russia steals millions of dollars from credit card companies using fake dating and porn sites on hundreds of domains to rack up fraudulent charges.
Despite Recession Jitters, M&A Dominates a Robust Cybersecurity Market
Funding has been somewhat lower than last year, but investment remains healthy, analysts say, amid thirst for cloud security in particular.
Russia Planning Cyberattacks on Ukraine's Energy Grid
Ukraine military intelligence says Russia is planning cyberattacks on the country's energy sector, as well as against allies including Poland and the Baltic states.
Should Hacking Have a Code of Conduct?
For white hats who play by the rules, here are several ethical tenets to consider.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Microsoft Looks to Enable Practical Zero-Trust Security With Windows 11
With the update, Microsoft adds features to allow easier deployment of zero-trust capabilities. Considering the 1.3 billion global Windows users, the support could make a difference.

Neglecting Open Source Developers Puts the Internet at Risk
From creating a software bill of materials for applications your company uses to supporting open source projects and maintainers, businesses need to step up their efforts to help reduce risks.

Malicious Apps With Millions of Downloads Found in Apple App Store, Google Play
The ongoing ad fraud campaign can be traced back to 2019, but recently expanded into the iOS ecosystem, researchers say.

MORE
EDITORS' CHOICE
App Developers Increasingly Targeted via Slack, DevOps Tools
Slack, Docker, Kubernetes, and other applications that allow developers to collaborate have become the latest vector for software supply chain attacks.
LATEST FROM THE EDGE

We're Thinking About SaaS the Wrong Way
Many enterprise applications are built outside of IT, but we still treat the platforms they're built with as point solutions.
LATEST FROM DR TECHNOLOGY

How Quantum Physics Leads to Decrypting Common Algorithms
YouTuber minutephysics explains how Shor's algorithm builds on existing formulae like Euclid's algorithm and Fourier transforms to leverage quantum superpositioning and break encryption.
WEBINARS
  • Next-Gen Security Operations: Building the SOC of the Future

    What does a security operations center (SOCs) require in 2022? The practice of monitoring and responding to threats looks very different today than it did just a few years ago. Which tools and skills do you need know to outfit a ...

  • Using Zero Trust to Protect Remote and Home Workers

    When COVID-19 hit, many organizations attempted to implement Zero Trust environments to protect their data from online threats presented by unsecured home office equipment. But these efforts were often temporary and not particularly effective. In this webinar, experts offer a ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.