At least two Russian nationals serving prison sentences for cybercrime offenses, Vladislav Klyushin and Roman Seleznev, were released as part of the landmark prisoner swap. [TechWeb]( Follow Dark Reading:
[RSS](
August 07, 2024 LATEST SECURITY NEWS & COMMENTARY [Russia's Priorities in Prisoner Swap Suggest Cyber Focus](
At least two Russian nationals serving prison sentences for cybercrime offenses, Vladislav Klyushin and Roman Seleznev, were released as part of the landmark prisoner swap.
[Dark Reading News Desk Live From Black Hat USA 2024](
The Dark Reading team once again welcomes the world's top cybersecurity experts to the Dark Reading News Desk live from Black Hat USA 2024. Tune into the livestream.
[Attackers Use Multiple Techniques to Bypass Reputation-Based Security](
Protections like Windows Smart App Control are useful but susceptible to attacks that allow threat actors initial access to an environment without triggering any alerts.
[Cyberattack Strikes the Grand Palais RMN; Impact Appears Limited](
Everyone expected some kind of cyberattack during the Olympics. If this is the best they've got, the bad guys don't deserve a spot on the podium.
[BlankBot Trojan Targets Turkish Android Users](
While still under development, the malware contains Turkish-language filenames, can record the screen and keystrokes, and inject custom overlays to steal passwords and sensitive data.
[Hunters International Disguises SharpRhino RAT as Legitimate Network Admin Tool](
The RaaS group that distributes Hive ransomware delivers new malware impersonating as validly signed network-administration software to gain initial access and persistence on targeted networks
[Preparing for the Future of Post-Quantum Cryptography](
The AI boom and increasing popularity of quantum computing necessitates quantum-resilient security.
[Rockwell PLC Security Bypass Threatens Manufacturing Processes](
A security vulnerability in Rockwell Automation's ControlLogix 1756 programmable logic controllers, tracked as CVE-2024-6242, could allow tampering with physical processes at plants. [MORE NEWS /]( [MORE COMMENTARY]( HOT TOPICS [20K Ubiquiti IoT Cameras & Routers Are Sitting Ducks for Hackers]( In the cloud, patches disseminate automatically. On your computer, you get notified. IoT devices, meanwhile, can escape attention for years on end.
[China's Evasive Panda Attacks ISP to Send Malicious Software Updates]( The APT used DNS poisoning to install the Macma backdoor on targeted networks and then deliver malware to steal data via post-exploitation activity.
[Protect Data Differently for a Different World]( Adopting a military mindset toward cybersecurity means the industry moves beyond the current network protection strategies and toward a data-centric security approach.
[How Regional Regulations Shape Global Cybersecurity Culture]( Ultimately, a more cyber-secure world requires a global governing body to regulate and campaign for cybersecurity, with consistent regulatory requirements in the various regions around the world. [MORE]( PRODUCTS & RELEASES [Check Point Research Reports Highest Increase of Global Cyber Attacks Seen in Last Two Years]( [Lakera Raises $20M Series A to Secure Generative AI Applications]( [Protect AI Acquires SydeLabs to Red Team Large Language Models]( [ESET Reveals Latest Cloud-Native Authentication Solution]( [AI-Driven Executive Impersonations Emerge As Significant Threat to Business Payment Processes](
[MORE PRODUCTS & RELEASES]( EDITORS' CHOICE [Critical Apache OFBiz Vulnerability Allows Preauth RCE](
The enterprise resource planning platform bug CVE-2024-38856 has a vulnerability-severity score of 9.8 out of 10 on the CVSS scale and offers a wide avenue into enterprise applications for cyberattackers. LATEST FROM THE EDGE [Name That Edge Toon: Pointing Fingers](
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card. LATEST FROM DR TECHNOLOGY [Startup Spotlight: Knostic Tackles AI's Oversharing Problem](
Cybersecurity startup Knostic, a finalist in this year's Black Hat USA Startup Spotlight competition, adds guardrails to how AI uses enterprise data to ensure sensitive data doesn't get leaked. LATEST FROM DR GLOBAL [Sophisticated Android Spyware Targets Users in Russia](
Researchers say "LianSpy" malware has been in use in a covert data gathering operation that's gone undetected for at least three years. WEBINARS - [The Rise of AI-Powered Malware and Application Security Best Practices](
- [CISO Perspectives: How to make AI an Accelerator, Not a Blocker]( [View More Dark Reading Webinars >>]( WHITE PAPERS - [Boston Beer Company Transforms OT Security & Reduces Costs](
- [Decode the New SEC Cybersecurity Disclosure Ruling](
- [State of Enterprise Cloud Security](
- [The Forrester Waveâ¢: External Threat Intelligence Service Providers, Q3 2023](
- [Google Cloud Threat Horizons Report, H1 2024](
- [A Year in Review of Zero-Days Exploited In-the-Wild in 2023](
- [2024 InformationWeek US IT Salary Report]( [View More White Papers >>]( FEATURED REPORTS - [Managing Third-Party Risk Through Situational Awareness](
- [2024 InformationWeek US IT Salary Report]( [View More Dark Reading Reports >>]( Dark Reading Daily
-- Published By [Dark Reading](
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:ContactDarkReading@informa.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: /cdn-cgi/l/email-protection?sp_aid=124997&elq_cid=22844169&sp_eh=9ec2e0353644c03ce56099bfb161a49d1f8a5a22f0d884f0cd961b89d205d529&utm_source=eloqua&utm_medium=email&utm_campaign=DR_NL_Dark%20Reading%20Daily_08.07.24&sp_cid=54604&utm_content=DR_NL_Dark%20Reading%20Daily_08.07.24&sp_eh=9ec2e0353644c03ce56099bfb161a49d1f8a5a22f0d884f0cd961b89d205d529#43
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.]( [© 2024]( | [Informa Tech]( | [Privacy Statement]( | [Terms & Conditions]( | [Contact Us](mailto:ContactDarkReading@informa.com)