Bitcoin is down more than 70% from its highs late last year, causing disruptions for cybercriminals and the underground exchanges that fuel the dark markets.
Follow Dark Reading:
 July 15, 2022
LATEST SECURITY NEWS & COMMENTARY
Is Cryptocurrency's Crash Causing Headaches for Ransomware Gangs?
Bitcoin is down more than 70% from its highs late last year, causing disruptions for cybercriminals and the underground exchanges that fuel the dark markets.
DHS Review Board Deems Log4j an 'Endemic' Cyber Threat
Vulnerability will remain a "significant" threat for years to come and highlighted the need for more public and private sector support for open source software ecosystem, Cyber Safety Review Board says.
Data Breaches Linked to Ransomware Declined in Q2 2022
Phishing retained its place as the top root cause of data compromises, according to new data from the Identity Theft Resource Center (ITRC).
Virtual CISOs Are the Best Defense Against Accelerating Cyber-Risks
A poor, permanent hire can be a very expensive error, whereas a mis-hire on a virtual CISO can be rapidly corrected.
Data of Nearly 2M Patients Exposed in Ransomware Attack on Healthcare Debt Collection Firm
Professional Finance Company (PFC) was hit in February 2022 by a ransomware attack.
New Phishing Kit Hijacks WordPress Sites for PayPal Scam
Attackers use scam security checks to steal victims' government documents, photos, banking information, and email passwords, researchers warn.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Fake Google Software Updates Spread New Ransomware
"HavanaCrypt" is also using a command-and-control server that is hosted on a Microsoft Hosting Service IP address, researchers say.

Microsoft Issues Fixes for 84 Vulnerabilities: Here's What to Patch Now
July's security update included fixes for one actively exploited flaw, more than 30 bugs in Azure Site Recovery, and four privilege escalation bugs in Windows Print Spooler.

How Confidential Computing Locks Down Data, Regardless of Its State
Whether data's in motion, at rest, or in use, confidential computing makes moving workloads to the public cloud safer, and can enhance data security in other deployments.

MORE
EDITORS' CHOICE
Researchers Devise New Speculative Execution Attacks Against Some Intel, AMD CPUs
"Retbleed" bypasses a commonly used mechanism for protecting against a certain kind of side-channel attack.
LATEST FROM THE EDGE

Name That Edge Toon: On Guard
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
LATEST FROM DR TECHNOLOGY

The Next Generation of Threat Detection Will Require Both Human and Machine Expertise
To be truly effective, threat detection and response need to combine the strengths of people and technology.
WEBINARS
  • Secure the Keys to Your Kingdom: Unveiling New Data on Global Attack Surface Threats

    The Cortex Xpanse research team has uncovered new data in our study of the global attack surface. From December 2021 to June 2022, we monitored scans of 50 million IP addresses associated with 100+ global enterprises, and we discovered new information on industries with ...

  • How Ransomware Works - And What You Can Do to Stop It

    From Darkside, to Lockbit, to Conti, ransomware gangs pulled off many headline-making attacks in the last year and they have evolved their techniques to become more stealthy and sophisticated when targeting organizations. In this webinar, experts walk you through the ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.