The booming economies of Africa, rich in natural resources and brimming with potential, are attracting not just investors but also cybercriminals. [TechWeb]( Follow Dark Reading:
[RSS](
October 05, 2024 LATEST SECURITY FEATURES & COMMENTARY [Criminals Are Testing Their Ransomware Campaigns in Africa](
The booming economies of Africa, rich in natural resources and brimming with potential, are attracting not just investors but also cybercriminals.
[MITRE Launches AI Incident Sharing Initiative](
The collaboration with industry partners will improve collective AI defenses. Trusted contributors receive protected and anonymized data on real-world AI incidents.
[Reachability Analysis Pares Down Static Security-Testing Overload](
For development teams awash in vulnerability reports, reachability analysis can help tame the chaos and offer another path to prioritize exploitable issues.
[What Communications Companies Need to Know Before Q-Day](
NIST standardized three algorithms for post-quantum cryptography. What does that mean for the information and communications technology (ICT) industry?
[NSA Releases 6 Principles of OT Cybersecurity](
Organizations can use this guide to make decisions about designing, implementing, and managing OT environments to ensure they are both safe and secure, as well as to enable business continuity for critical services.
[4 Ways to Fight AI-Based Fraud](
Generative AI is being used to make cyberscams more believable. Here's how organizations can counter that using newly emerging tools and reliable methods.
[Dragos Expands ICS Platform With New Acquisition](
The addition of Network Perception will bring enhanced network visibility, compliance, and segmentation analytics to the Dragos OT cybersecurity platform.
[Normalizing Security Culture: You Don't Have to Get Ready If You Stay Ready](
Prioritizing security as a critical element to an organization's effectiveness and success will reduce the risk of incidents, while benefiting the whole team and the organization's reputation. [MORE FROM THE EDGE]( / [MORE FROM DR TECHNOLOGY]( HOT TOPICS [Thousands of DrayTek Routers at Risk From 14 Vulnerabilities]( Several of the flaws enable remote code execution and denial-of-service attacks, while others enable data theft, session hijacking, and other malicious activity.
[Near-'perfctl' Fileless Malware Targets Millions of Linux Servers]( Armed with a staggering arsenal of at least 20,000 different exploits for various Linux server misconfigurations, perfctl is everywhere, annoying, and tough to get rid of.
[Ukraine-Russia Cyber Battles Tip Over Into the Real World]( "Pig butchering," generative AI, and spear-phishing have all transformed digital warfare. [MORE]( PRODUCTS & RELEASES [Palo Alto Networks and Deloitte Expand Strategic Alliance Globally]( [Kevin Mandia Joins Expel's Board of Directors]( [Bishop Fox Announces Cosmos Integration With ServiceNow]( [Retail & Hospitality ISAC Announces Pam Lindemoen As New CSO and VP]( [Darktrace Announces Formal Completion of its Acquisition by Thoma Bravo]( [Apono Raises $15.5M Series A Funding for AI-driven, Least Privilege Solution Set](
[MORE PRODUCTS & RELEASES]( EDITORS' CHOICE [Share Your Views on Security Awareness](
Tell us what you think about the state of cybersecurity and security awareness in the enterprise. Please take this [Dark Reading survey](. You could win a $50 Amazon gift card for your participation. [Target Practice: Honing Critical Skills on Cyber Ranges](
Cyber ranges are a great way for cyber professionals to keep up on emerging threats and new technologies â while having a little fun.
[Cybersecurity Is Serious â but It Doesn't Have to Be Boring](
Thoughtfully applied, humor breaks through security fatigue, increases engagement, and fosters a culture of security awareness.
[Keep Tier-One Applications Out of Virtual Environments](
Crafty bad actors can infect all of an organization's virtual machines at once, rendering tier-one applications useless.
[Top 5 Myths of AI & Cybersecurity](
Organizations looking to maximize their security posture will find AI a valuable complement to existing people, systems, and processes. WEBINARS - [Building Blocks for Next-Generation Security Operations](
- [10 Emerging Vulnerabilities Every Enterprise Should Know]( [View More Dark Reading Webinars >>]( WHITE PAPERS - [IDC White Paper: The Peril and Promise of Generative AI in Application Security](
- [Gartner Magic Quadrant for Application Security Testing](
- [Gartner Report: Cyber Asset Attack Surface Management](
- [Generative AI Gifts](
- [5 Essential Insights into Generative AI for Security Leaders](
- [SANS Security Awareness Maturity Model](
- [How to Use Threat Intelligence to Mitigate Third-Party Risk]( [View More White Papers >>]( FEATURED REPORTS - [Managing Third-Party Risk Through Situational Awareness](
- [2024 InformationWeek US IT Salary Report]( [View More Dark Reading Reports >>]( Dark Reading Daily
-- Published By [Dark Reading](
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:ContactDarkReading@informa.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: /cdn-cgi/l/email-protection?sp_aid=126143&elq_cid=22844169&sp_eh=9ec2e0353644c03ce56099bfb161a49d1f8a5a22f0d884f0cd961b89d205d529&utm_source=eloqua&utm_medium=email&utm_campaign=DR_NL_Dark%20Reading%20Daily_10.05.24&sp_cid=55321&utm_content=DR_NL_Dark%20Reading%20Daily_10.05.24&sp_eh=9ec2e0353644c03ce56099bfb161a49d1f8a5a22f0d884f0cd961b89d205d529#a9
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.]( [© 2024]( | [Informa Tech]( | [Privacy Statement]( | [Terms & Conditions]( | [Contact Us](mailto:ContactDarkReading@informa.com)