The booming economies of Africa, rich in natural resources and brimming with potential, are attracting not just investors but also cybercriminals.
Follow Dark Reading:
 October 05, 2024
LATEST SECURITY FEATURES & COMMENTARY
Criminals Are Testing Their Ransomware Campaigns in Africa
The booming economies of Africa, rich in natural resources and brimming with potential, are attracting not just investors but also cybercriminals.
MITRE Launches AI Incident Sharing Initiative
The collaboration with industry partners will improve collective AI defenses. Trusted contributors receive protected and anonymized data on real-world AI incidents.
Reachability Analysis Pares Down Static Security-Testing Overload
For development teams awash in vulnerability reports, reachability analysis can help tame the chaos and offer another path to prioritize exploitable issues.
What Communications Companies Need to Know Before Q-Day
NIST standardized three algorithms for post-quantum cryptography. What does that mean for the information and communications technology (ICT) industry?
NSA Releases 6 Principles of OT Cybersecurity
Organizations can use this guide to make decisions about designing, implementing, and managing OT environments to ensure they are both safe and secure, as well as to enable business continuity for critical services.
4 Ways to Fight AI-Based Fraud
Generative AI is being used to make cyberscams more believable. Here's how organizations can counter that using newly emerging tools and reliable methods.
Dragos Expands ICS Platform With New Acquisition
The addition of Network Perception will bring enhanced network visibility, compliance, and segmentation analytics to the Dragos OT cybersecurity platform.
Normalizing Security Culture: You Don't Have to Get Ready If You Stay Ready
Prioritizing security as a critical element to an organization's effectiveness and success will reduce the risk of incidents, while benefiting the whole team and the organization's reputation.
MORE FROM THE EDGE / MORE FROM DR TECHNOLOGY
HOT TOPICS
Thousands of DrayTek Routers at Risk From 14 Vulnerabilities
Several of the flaws enable remote code execution and denial-of-service attacks, while others enable data theft, session hijacking, and other malicious activity.

Near-'perfctl' Fileless Malware Targets Millions of Linux Servers
Armed with a staggering arsenal of at least 20,000 different exploits for various Linux server misconfigurations, perfctl is everywhere, annoying, and tough to get rid of.

Ukraine-Russia Cyber Battles Tip Over Into the Real World
"Pig butchering," generative AI, and spear-phishing have all transformed digital warfare.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
Share Your Views on Security Awareness
Tell us what you think about the state of cybersecurity and security awareness in the enterprise. Please take this Dark Reading survey. You could win a $50 Amazon gift card for your participation.

Target Practice: Honing Critical Skills on Cyber Ranges
Cyber ranges are a great way for cyber professionals to keep up on emerging threats and new technologies — while having a little fun.
Cybersecurity Is Serious — but It Doesn't Have to Be Boring
Thoughtfully applied, humor breaks through security fatigue, increases engagement, and fosters a culture of security awareness.
Keep Tier-One Applications Out of Virtual Environments
Crafty bad actors can infect all of an organization's virtual machines at once, rendering tier-one applications useless.
Top 5 Myths of AI & Cybersecurity
Organizations looking to maximize their security posture will find AI a valuable complement to existing people, systems, and processes.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.