As the iGaming and online sports betting industry faces increasingly sophisticated cyber threats, Continent 8 is proud to launch Threat Exchange – the sector’s first dedicated cyber threat intelligence (CTI) platform.

Threat Exchange

Below, we answer some of the most pressing questions regarding the solution and how it is tailored for incident response teams, operators, platform providers, B2B gaming technology companies and regulators.

Frequently Asked Questions (FAQ)

What is cyber threat intelligence?

A cyber threat intelligence (CTI) platform collects, analyses and shares information about current and emerging cyber threats to help organisations anticipate, detect and respond to attacks more effectively. It typically includes:

CTI platforms are essential for building a proactive security posture, especially in high-risk industries like iGaming and online sports betting.

What is Threat Exchange?

Threat Exchange is a managed cyber threat intelligence platform designed specifically for the iGaming and online sports betting industry. It delivers real-time, sector-specific insights to help incident response teams, operators, platform providers, B2B gaming technology companies and regulators detect and share information on emerging threats, sharpen awareness and act with confidence.

How is Threat Exchange different from other CTI platforms? What is its unique selling proposition (USP)?

Unlike generic CTI solutions, Threat Exchange is purpose-built for iGaming. It leverages Continent 8’s and C8 Secure’s unique position as both an internet service provider (ISP) and managed security service provider (MSSP) in the industry, offering exclusive intelligence, real-time threat correlation and honeypot-driven insights tailored to gaming environments.

What industry challenges does Threat Exchange solve?

Threat Exchange addresses the following critical challenges:

What are the key features of Threat Exchange?

Cyber Threat Exchange’s key features include:

Who is Threat Exchange for?

Whether you’re protecting high-value player accounts, monitoring threats during major sporting events or securing gaming APIs, Threat Exchange is designed to meet the needs of the industry. The solution is suitable for:

What are the use cases for Threat Exchange?

Use case 1: How does Threat Exchange support incident response teams?
Use case 2: How does Threat Exchange support online casinos?
Use case 3: How does Threat Exchange support online sports betting platforms?
Use case 4: How does Threat Exchange support multi-vertical gaming operators?
Use case 5: How does Threat Exchange support B2B gaming technology providers?
Use case 6: How does Threat Exchange support regulatory compliance?

What pricing tiers are available?

Threat Exchange offers several tiers, from a community tier with basic access to advanced tiers with predictive analytics and premium add-ons. Each tier is designed to meet different operational needs and cybersecurity maturity levels.

What add-on services are available?

It’s important that businesses take a multi-layered approach to cybersecurity to ensure full protection. Add-on services include:

What’s coming next for Threat Exchange?

We’re excited for the launch but we’re already looking to the future. Developments include:

How can I get started?

Contact your Continent 8 account manager or visit Threat Exchange to request a demo, explore pricing tiers and see how Threat Exchange can elevate your cybersecurity posture.

Continent 8’s end-to-end regulatory cybersecurity services ensure Rising Digital maintains full compliance within the six – and growing – US states in which it operates.

The Customer

Rising Digital Corporation is a gaming company that develops and publishes slot games, table games, game systems and game platforms. Recognized as the leading developer of Asian slot games in the casino gaming industry, Rising Digital provides games to the major gaming manufacturers worldwide.

The Challenge

Rising Digital required a Managed Security Service Provider (MSSP) to architect and deploy regulatory compliance programs tailored to the diverse requirements of each interested US state jurisdiction, ensuring consistent, best-in-class security and regulatory standards across all operational states.

The Solution

Rising Digital selected Continent 8, its existing cloud partner and the leading provider of infrastructure and cybersecurity solutions for the iGaming and online sports betting sector, to lead its regulatory cybersecurity strategy.

In collaboration with Continent 8 and its cybersecurity specialist division, C8 Secure, Rising Digital successfully completed a comprehensive suite of regulatory compliance assessments and services, including:

compliance audit

VAPT VSCAN

The Benefits

Rising Digital has successfully rolled out a comprehensive cybersecurity program across multiple jurisdictions, including Connecticut, Delaware, Michigan, New Jersey, Pennsylvania and West Virginia – as well as the Canadian province of Ontario – delivering compliance with state-specific requirements. In addition, Continent 8’s regulatory cybersecurity expertise has enabled the proactive identification of vulnerabilities and the delivery of actionable insights that fortify Rising Digital’s cybersecurity posture.

Project Conclusion

By partnering with Continent 8 and leveraging its regulatory cybersecurity services, Rising Digital is strategically positioned to proactively address and surpass evolving compliance requirements. This collaboration ensures a measurable competitive edge with regulators across both forthcoming US state market deployments and established jurisdictions.

Aimin Cong, CEO of Rising Digital, said: “We are delighted to formalize our relationship with Continent 8 for our growing iGaming operations business. With the utmost importance being placed upon compliance, performance and security, we believe Continent 8 is an excellent infrastructure and cybersecurity services partner.”

Patrick Gardner, Chief Security Officer at Continent 8, said: “We are honored that Rising Digital has placed its trust in Continent 8 as its infrastructure and cybersecurity partner as they expand their operations across the United States.

“At Continent 8, we pride ourselves as being a one-stop-shop provider of infrastructure, cloud, regulatory and cybersecurity solutions. Our services enable iGaming companies like Rising Digital to swiftly meet multi-state regulatory requirements, safeguarding their operations while providing peace of mind.  We stand committed to setting the highest standards and value for cybersecurity and compliance services within the ever-growing iGaming and online sports betting sector.”

For more information on how to meet your jurisdiction’s regulatory cybersecurity requirements, visit continent8.com or contact sales@continent8.com.

16K

number of games accessible to B2C operators

21K

transactions per second that need to be secured

0

critical cybersecurity issues identified

Global iGaming aggregator leverages Continent 8’s Vulnerability Assessment and Penetration Testing (VAPT) cybersecurity services to securely connect B2C operators to over 16,000 games from more than 160 providers.

The customer

Alea is an award-winning leader in the field of online gaming, with a decade of experience in the industry. Alea aggregation platform handles over 21,000 transactions per second, with bank-level security, full regulatory coverage and local insights that helps their customers move faster in markets like Brazil, South Africa, Spain and beyond.

Alea is one of the industry’s most rapidly expanding game aggregators. By utilising a single API integration, Alea offers customers access to over 16,000 games from more than 160 providers, simplifying technical complexities and enhancing operational efficiency. The security and reliability of these game APIs and integrations are vital to Alea’s operational integrity.

To address the evolving cybersecurity challenges associated with a rapidly growing network, Alea engaged Continent 8 to conduct a thorough assessment and evaluation of their cybersecurity framework through a comprehensive Vulnerability Assessment and Penetration Testing (VAPT) service.

The challenge

Alea’s coding platform comprises over 100 microservices leveraging diverse technologies, databases and queue systems, presenting a significant technical challenge in securing all connections. Additionally, Alea processes over 21,000 requests per second, necessitating the demonstration of successful transaction management. With a complex aggregation platform, Alea aimed to ensure and demonstrate their status as a secure and robust game aggregator provider.

The solution

Continent 8, along with its specialised cybersecurity division, C8 Secure, conducted the cybersecurity audit. They employed their Vulnerability Assessment and Penetration Testing (VAPT) service to perform a thorough security evaluation of Alea’s entire digital infrastructure, providing a complete view of their attack surface area.

The benefits

The VAPT service from Continent 8 and C8 Secure enabled Alea to safeguard their API, code and services against vulnerabilities such as broken authentications, cross-site scripting (XSS), sensitive data exposure and SQL injection. As a result, the cybersecurity audit identified no critical issues within their aggregation platform.

Project conclusion

The comprehensive VAPT assessment allowed Alea to detect potential internal and external IT vulnerabilities, enabling them to prioritise and implement security improvements to reduce risk exposure, thereby assuring their customers of a secure and reliable platform.

Alea Partnership

Patrick Gardner, Chief Security Officer at Continent 8, presenting Eduard Fumás, Chief Technology Officer at Alea, with their VAPT completion certificate.

Eduard Fumás, Chief Technology Officer at Alea said, “At Alea, security is at the core of everything we do. Our commitment to creating a secure, robust and scalable API solution sets a new standard in the iGaming industry, where data protection and system integrity are critical. Partnering with Continent 8 has been an important step for us in proactively safeguarding our platform and reinforcing the trust our partners place in us. This collaboration ensures that we continue to deliver a reliable, secure API experience to our clients. We’re proud to work with a partner that shares our dedication to cybersecurity excellence.”

Patrick Gardner, Chief Security Officer at Continent 8 said, “Alea’s three principles of security, scalability and robustness resonate with Continent 8. Given the number of APIs Alea is using, their proactive approach to assessing their business and guaranteeing security for its partners is imperative.

“It’s great to be supporting Alea; we encourage all businesses in this industry to take the cybersecurity threat seriously.”

Vulnerability Assessment and Penetration Testing (VAPT) service enables the independent gaming commission to test IT infrastructure for vulnerabilities

Continent 8 Technologies, the leading provider of managed hosting, connectivity, cloud and cybersecurity solutions for the tribal gaming industry, supports Cherokee Tribal Gaming Commission (TGC) with its proven Vulnerability Assessment and Penetration Testing (VAPT) services.

The Cherokee Tribal Gaming Commission is the independent tribal gaming regulatory authority established in 1993 under Chapter 16 of the Cherokee Code of the Eastern Band of Cherokee Indians (EBCI).Charged with the duty to ensure fairness and integrity of the gaming activities within its facilities, the commission enlisted Continent 8, and its cybersecurity division, C8 Secure, to conduct pen testing.

Cherokee Continent 8 Partnership

The VAPT service provides a comprehensive security assessment of an organizations infrastructure and applications. Often mandated by regulation, it helps organizations measure the real-world effectiveness of their security controls and incident response capabilities. Additionally, the service provides actionable insights, including prioritized recommendations and industry best practices to address identified vulnerabilities and strengthen overall cybersecurity posture.

Emra Arkansas, Executive Director at Cherokee Tribal Gaming Commission said: We are sincerely grateful to Continent 8, especially Patrick Gardner, Anthony Engel and Jerad Swimmer, for their partnership and recognition of our ongoing cybersecurity initiatives. The Cherokee Tribal Gaming Commission remains firmly committed to protecting not only our critical infrastructure but also the sovereignty that underpins our regulatory authority. In an era of growing cyber threats, safeguarding Tribal IT systems is more than a technical priority, it is a sovereign responsibility. With Continent 8s trusted expertise, we are proud to set a higher standard for cybersecurity in Indian Country, ensuring our operations remain secure, resilient and self-determined.

Patrick Gardner, Chief Security Officer at Continent 8 said:In response to todays evolving cyber threat landscape, the Cherokee Tribal Gaming Commission is working to establish a new standard in cybersecurity and we are proud to support this important initiative. Their proactive efforts to safeguard critical infrastructure reflect a deep and ongoing investment in cybersecurity resilience.”

Jerad Swimmer, Regional Sales Director at Continent 8 added: “It was a pleasure collaborating with the Cherokee Tribal Gaming Commission in conducting a comprehensive evaluation of their IT infrastructure. Their team has shown a tremendous awareness of the escalating cybersecurity challenges within the tribal gaming sector. It is encouraging to see both enterprises and regulatory authorities actively enhancing their cybersecurity measures.”

For more information on how Continent 8 can support your cybersecurity initiatives or to schedule a no-obligation Cybersecurity Readiness Consultation, contact Regional Sales Director, Jerad Swimmer, at jerad.swimmer@continent8.com.

Key highlights:

In the iGaming and online sports betting industry, where cybersecurity breaches can result in unauthorised access, identity theft, account takeovers, operational disruptions and reputational damage, MFA is an essential security measure. It’s also mandated for the regulated Brazilian iGaming market, where operators must submit proof of compliance.

Luana

In this blog, Luana Monje, Brazil-based Sales Executive at Continent 8 Technologies, explores the significance of MFA in Brazil’s exciting market, highlighting its role as both a regulatory cybersecurity requirement, outlining key considerations when selecting an effective authentication platform, and showcasing Continent 8’s passwordless MFA solution designed to deliver the most seamless single-step PIN experience.

What is multi-factor authentication?

According to the Secretariat of Prizes and Bets (SPA) and the Ministry of Finance’s (MF) technical and cybersecurity guidelines for Brazil’s betting systems (Ordinance No. 722, available in Portuguese), MFA is defined as:

A type of authentication that uses two or more of the following elements to verify a user’s identity: information known only to the user, such as a password, a pattern, or answers to challenge questions; an item owned by a user, such as an electronic token, a physical token, or an identification card; a user’s biometric data, such as fingerprints, facial or voice recognition.

Regulatory compliance with Brazil’s betting and gaming systems

First and foremost, Brazilian regulations require the implementation of MFA across several technical and cybersecurity requirements outlined in Ordinance No. 722. These requirements include:

Ordinance 722, Annex I, sections 12, 13 and 16 – Access to the betting system:

  1. In cases where the bettor forgets his username and/or password, the system must offer a multi-factor authentication process for the recovery or reset of the user and/or password, one of the factors being facial recognition.
  2. If any suspicious activity is detected, such as multiple unsuccessful login attempts, the betting system shall block the respective account. In this case, for the account to be unlocked, a multi-factor authentication process must be carried out, one of the factors being facial recognition.
  1. The betting system must require the bettor to have a multi-factor authentication:

a) at least once every 7 (seven) days; or

b) on the first access after a period of inactivity of more than 7 (seven) days.

Ordinance 722, Annex IV, section 25f – Technical Controls, DNS requirements:

25 – The following requirements apply to servers used to resolve Domain Name System (DNS) queries in association with the betting system:

f) multi-factor authentication must be in place

MFA provides a layer of cybersecurity that significantly mitigates the risk of unauthorised access, thereby safeguarding sensitive data and personal information.

Evaluating the right MFA technology for iGaming operations

With MFA being a regulatory requirement in Brazil, iGaming and online sports betting operators need to evaluate which MFA options are most suitable for their operations. Here are some key considerations when assessing an MFA platform, and how Continent 8 can support your MFA journey.

Key Consideration The Continent 8 MFA Advantage
User experience Same passwordless, 2-second, single-step login – on all devices and browsers

99.9% of users log in within 2 seconds. Supports biometric auth in apps.

Our MFA solution ensures consistent user experiences across both app and browser platforms, while also offering the option of local biometric authentication for apps.

Compatibility / Operability 100% of devices, 100% of browsersOur MFA solution ensures complete independence from hardware or operating systems, enabling compatibility across all devices and platforms.

By providing our solution through the same browser interface as the operator’s service, or by embedding the technology directly into the operator’s native app, we support:

  • 100% of devices and browsers
  • 100% of users
  • 100% of the time
Login success rate 99.93% login success or higherOur MFA platform streamlines the login process to a passwordless, single user step. The system is capable of operating with either a PIN or biometric authentication, providing users with flexibility and a reliable fallback across any device or browser.

Each additional step increases the potential for user error, and every dependency (such as downloads, installations, mobile phones, cellular networks, or username entry) introduces a potential point of failure for both users and the system.

Our platform achieves a 99.93% login success rate in consumer-facing applications, using either a 4-digit PIN or device-based biometric authentication where available.

Our platform also attains a 99.997% success rate in action (transaction) authentication.

There is no difference in success rates between mobile and tablet/laptop devices, as the system does not rely on the presence of a mobile device.

Registration success rate +18% in player registrations, 20% boost in profitsOur MFA solution’s enrolment process simply requires users to select a 4-digit PIN. This procedure does not require any permissions, downloads, plug-ins, imported keys or configurations, thereby eliminating registration failures. The enrolment can be completely invisible and take place during customer registration.

User process – on any device or browser:

  1. Choose a PIN
  2. SUCCESS

The result: +18% increase in user registrations which can boost profits by up to 20%.

Support costs 90% savings in support costs

Our MFA solution minimises support-related expenses and resources with a self-sufficient service. For example, this platform eliminates the need for password reset assistance – accounting for up to 60% of support desk inquiries, costing an estimated $15-70 per call – and customer validation.

MSSP services 360-degree support

As an MSSP, we offer comprehensive end-to-end support for seamless evaluation, deployment, and ongoing assistance by:

  • Managing the enrolment and remote blacklisting of devices
  • Authenticating and digitally sign any action/transaction for security/assurance and meet modern banking standards
  • Authenticating inbound callers to support/help desks
  • Authenticating users on secondary devices such as kiosks or point-of-sales (PoS) installations
  • Enabling the rapid installation and enrolment of a mobile app initiated from the desktop
  • Combating bonus and referral fraud
Technology Minimal attack surface, no single point of failure

Our MFA solution employs advanced zero-knowledge proof of identity, ensuring a minimal trust surface and eliminating any single point of failure. Provides robust two-factor authentication, with the option of a software-only solution.

Data privacy Zero information required

Our MFA solution does not require any Personally Identifiable Information (PII) from the end user. Instead, we only need a unique identifier, which may be a hash of a mobile number, email address, or username, thereby ensuring the solution’s adaptability to various identity schemes.

 

Future-proofing Brazil’s iGaming market with advanced seamless authentication

The iGaming and online betting industry is constantly evolving, with new technologies and threats emerging regularly. Multi-factor authentication is an essential component of future-proofing betting and gaming platforms against these evolving risks. By integrating advanced authentication methods, iGaming and online sports betting operators can stay ahead of cyber threats and continuously protect their systems and players’ data.

How Continent 8 can help your business implement MFA

Continent 8 is committed to supporting businesses in the iGaming and online sports betting industry with their cybersecurity needs. Our team of experts works closely with you to design and implement tailored MFA solutions that align with your regulatory requirements and business objectives.

To learn more about Continent 8’s MFA solution, contact Luana at luana.monje@continent8.com.

Craig Lusher from our Secure team provides a comprehensive analysis of the latest Distributed Denial of Service (DDoS) statistics from the first quarter of the year and their implications for cybersecurity trends.

Executive summary

The first quarter of 2025 has revealed significant changes in the DDoS threat landscape, characterised by a substantial increase in attack frequency, the emergence of ‘carpet bombing’ techniques and growing trends targeting the iGaming sector. With attack methodologies evolving and becoming more sophisticated, this report provides critical insights for cybersecurity planning and threat mitigation.

Overview of 1Q 2025

The first quarter of 2025 has shown a noticeable increase in DDoS attack activity, with 161 attacks recorded. This represents a rise from 4Q 2024’s 138 attacks and a dramatic increase from 1Q 2024’s 58 attacks. The most active month was February, which continues to show vulnerability during winter months.

Attack intensity and scale

1Q 2025 showed the following patterns in attack intensity:

While individual attack sizes appear smaller compared to historical peaks (2Q 2023’s 560.6 Gbps), this represents a strategic shift rather than reduced threat capability. Intelligence indicates that attackers now possess capabilities exceeding 500 Gbps but are employing more targeted and distributed approaches that can bypass traditional detection mechanisms.

Industry targeting analysis

1Q 2025 has shown a marked increase in attacks specifically targeting the online gambling and casino sector, with intelligence indicating a 400% rise in attacks against these entities since February. This industry-specific targeting represents a prominent trend that requires specialised attention and defence mechanisms.

Customer report analysis

Key statistics for 1Q 2025:

On 26 February, a carpet-bombing incident targeted 53 networks within a short 6-minute window (03:41-03:47 UTC). While this attack peaked at 150 Gbps with 120 Mpps, its distributed nature allows it to circumvent traditional defence systems, potentially resulting in a significant customer impact.

Quarterly comparison and trends

Comparing 1Q 2025 with recent quarters reveals several trends:

  1. Attack volume escalation

This shows a clear trend of increasing attack volumes over the past three quarters, with a 372% increase from 3Q 2024 to 1Q 2025.

  1. Attack methodology evolution

While individual attack volume metrics appear to show decreasing intensity, this is misleading as attacks are now distributed across multiple targets simultaneously, making traditional detection mechanisms less effective.

  1. Customer report patterns

The number of affected customers has increased dramatically in 1Q 2025, indicating a broader targeting strategy. Of particular note is the observed ‘spray’ technique that targets entire network Classless Inter-Domain Routing (CIDR) blocks rather than individual IPs, affecting multiple customers simultaneously.

  1. Emerging threat: DDoS carpet bombing

1Q 2025 has seen the emergence of carpet bombing or spray attacks that distribute traffic across multiple hosts within targeted IP ranges. These attacks:

Year-over-year analysis

Comparing 1Q 2025 to 1Q 2024 shows significant changes in the threat landscape:

Data breach correlation analysis

Intelligence indicates a notable correlation between DDoS attacks and subsequent data breaches in the iGaming sector. 1Q 2025 has seen examples of multiple organisations experiencing what appears to be a new attack pattern:

  1. Initial DDoS attacks serving as diversionary tactics
  2. Followed by sophisticated data exfiltration operations
  3. Resulting in large-scale data leaks (reaching hundreds of gigabytes)

Unlike traditional ransomware operations, these attacks show no ransom demands prior to data release, indicating a potential shift in threat actor motivations from financial gain to maximum disruption or competitive advantage.

Implications and insights

  1. Attack methodology evolution

The transition to carpet-bombing techniques represents a significant evolution in DDoS tactics. These attacks distribute traffic across multiple targets within a network range, using traffic volumes per target that stay below conventional detection thresholds.

  1. Industry targeting

Intelligence indicates a targeted campaign against the iGaming sector, with a 400% increase in attacks since February 2025.

  1. Attack duration and reconnaissance

The average attack duration has increased dramatically to 4.3 hours, with the longest attack lasting 54 hours. Short, intense attacks (3-6 minutes) are now frequently observed as reconnaissance to test defence capabilities before launching larger campaigns.

Emerging AI-enhanced threats

Intelligence suggests a rising trend of AI technology adoption by threat actors. Self-hosted AI tools are enabling more sophisticated and unpredictable attack patterns that traditional defence mechanisms struggle to detect. These AI-enhanced attacks show several characteristics:

  1. Dynamic adaptation to defence mechanisms
  2. Improved ability to bypass detection thresholds
  3. More convincing social engineering components in blended attacks
  4. Enhanced coordination between DDoS attacks and subsequent breach attempts

Recommended defence strategies

Based on 1Q 2025 attack patterns, particularly the emergence of carpet-bombing techniques, the following defence strategies are recommended:

  1. Dynamic threshold configuration

  2. Advanced rate limiting

  3. Enhanced monitoring

  4. Automated response

Looking ahead

The increase in attack volumes and sophistication in 1Q 2025 indicates a significant evolution in the threat landscape. Organisations should prepare for:

  1. Continued sophisticated carpet-bombing attacks targeting multiple hosts simultaneously
  2. Increased targeting of online gambling and casino operations
  3. Short ‘test’ attacks followed by larger, more sustained campaigns
  4. Blended attacks where DDoS serves as a distraction for data breach attempts

The 26 February incident, which affected 53 networks within a 6-minute window, demonstrates the effectiveness of these new attack methodologies and highlights the need for enhanced detection and mitigation capabilities.

Continent 8’s DDoS mitigation solution

Our best-in-class DDoS solution continues to evolve and in recent months we have amplified our scrubbing capacity to 5+ Tbps, as well as increased our scrubbing centres geographically deployed across multiple continents. Locations include Los Angeles, Chicago, New York, Miami, London, Amsterdam, Frankfurt, Singapore, Hong Kong and Sao Paulo.

Key features of our mitigation solution:

DDoS protection should also form part of a wider, multi-layered approach to cybersecurity. A 360-degree, end-to-end protection strategy should include DDoS mitigation solution as well as WAF/WAAP protectionMDR/EDR servicesSIEM and SOC resourcesVAPT assessmentsbackup solutions, and mobile devicephishing defence and MFA services.

This is the only way to have multiple protections in place for each attack type and to ensure the greatest level of resilience.

To learn more about how Continent 8 can help protect your organisation, contact a member of the team via sales@continent8.com or our Contact Us form.

The iGaming and online sports betting industry is facing unprecedented cybersecurity challenges, and multi-factor authentication (MFA) is becoming a crucial element for compliance and protection against cyber threats.

In this blog, Justin Cosnett, Chief Product Officer at Continent 8, will explore the cybersecurity landscape within iGaming, analyse the regulatory requirements for MFA in the US, discuss strategies for effectively navigating compliance while enhancing user experience and illustrate how passwordless MFA can be a game-changer in the iGaming industry.

The growing importance of iGaming cybersecurity

In the rapidly expanding world of iGaming and online sports betting, cybersecurity has become a non-negotiable priority. As digital platforms proliferate, so do the threats aimed at them. Cyber criminals are constantly evolving their tactics, making it essential for operators to stay ahead of the curve. The stakes are high: a single breach can result in massive financial losses, reputational damage and erosion of customer trust.

Moreover, the nature of our industry, which involves real-time transactions and sensitive personal data, makes it an attractive target for cyber attacks. Implementing robust cybersecurity measures, including MFA, is not just about compliance; it’s about safeguarding the integrity of the gaming experience and protecting both the business and its players.

Understanding regulatory requirements for MFA in the US for iGaming and online sports betting

In the US, regulatory requirements for MFA vary by state.

Several regulated states have recognised the critical need for enhanced cybersecurity measures and have mandated the use of MFA for online gambling platforms. States such as Michigan, New Jersey and Pennsylvania are leading the charge – with others following suit – requiring operators to implement MFA to comply with state regulations.

These regulations are designed to protect consumers and ensure the integrity of the gaming environment. By requiring MFA, these states – and markets such as Brazil and Italy – aim to reduce the risk of unauthorised access and fraud, thereby fostering a safer and more trustworthy industry. Operators must stay informed about the regulatory landscape and ensure they meet all necessary requirements to avoid penalties and maintain their operating licenses.

Business challenges: Navigating compliance and user experience

Implementing MFA comes with its own set of challenges, particularly in balancing compliance with user experience. No operator wants to add friction to the login process, especially given the rise of live betting on mobile apps.

Statistics show that 20-30%* of users abandon login attempts due to friction caused by complex authentication processes. For iGaming and online sports betting operators, this can translate in a decrease in player engagement and potential profit losses of up to 20%*.

Businesses must navigate the tightrope of stringent regulatory compliance while ensuring a seamless and enjoyable user experience. This often involves investing in advanced MFA solutions that offer robust security without compromising on convenience.

Introducing Continent 8’s solution, powered by MIRACL: A passwordless MFA solution

Continent 8, in partnership with MIRACL, offers a cutting-edge passwordless MFA solution that addresses both security and user experience challenges. MIRACL’s technology eliminates the need for traditional passwords, replacing them with a single-step authentication process that is both secure and user-friendly.

Key statistics underscore the effectiveness of this solution: a 99.9% reduction in account takeovers, a 70% decrease in user login friction and a significant increase in user satisfaction and retention rates. By leveraging MIRACL’s passwordless authentication, operators can provide a seamless and secure login experience that meets regulatory requirements and enhances customer loyalty.

Quick. Easy. Successful.

How Continent 8 can help your business implement MFA

Continent 8 is committed to supporting businesses in the iGaming and online sports betting industry with their cybersecurity needs. Our team of experts works closely with customers to design and implement a tailored MFA solution that align with regulatory requirements and business objectives.

Trust Continent 8 to be your partner in navigating the complexities of cybersecurity and regulatory compliance in the gambling industry.

Are you compliant? Are you losing players at login? Are you missing out on revenue? See a live demo of our MFA solution on our rapid-fire webinar, ‘Passwordless MFA:

Improve player login and maximise profit potential’ hosted by Justin on Monday 10 March. Register here.

Craig Lusher from our Secure team provides a comprehensive analysis of the latest Distributed Denial of Service (DDoS) statistics from the fourth quarter of the year and their implications for cybersecurity trends.

Overview of 4Q 2024

The fourth quarter of 2024 marked a significant shift in DDoS attack patterns, with 138 recorded incidents. This represents a substantial increase from 3Q’s 37 attacks, though remaining well below historical peaks like 2Q 2023’s 1,106 attacks. October emerged as the most active month, aligning with historical patterns of increased 4Q activity.

This is a trend not just at Continent 8. In fact, 4Q also happened to see the largest DDoS attack ever recorded, with Cloudflare mitigating a 5.6 (Terabits per second) Tbps Mirai-variant botnet attack on one of their customers on October 29.

Attack intensity and scale

4Q 2024 demonstrated interesting patterns in attack intensity:

This quarter’s largest attack of 13.4 Gbps represents a decrease from 3Q 2024’s peak of 37.0 Gbps. For perspective, this is dramatically lower than 4Q 2023’s peak of 412.9 Gbps, indicating a significant shift in attack methodologies.

Attack duration patterns

Key statistics for 4Q 2024:

Customer report analysis

Key statistics for 4Q 2024:

Quarterly comparison and trends

Comparing 4Q 2024 with recent quarters reveals several interesting trends:

  1. Attack volume evolution

This shows a significant escalation in attack frequency during 4Q.

  1. Attack intensity progression

While attack frequency increased, intensity continued to decrease throughout the year.

  1. Customer report patterns

The decrease in affected customers coupled with the dramatic increase in attacks per customer suggests a shift toward more targeted campaigns.

Year-over-year analysis

Comparing 4Q 2024 to 4Q 2023 shows significant changes in the threat landscape:

Implications and insights

  1. Attack evolution

The higher volume but lower intensity of attacks suggests a fundamental shift in attacker strategies, focusing on persistent, lower-threshold campaigns rather than high-impact events.

  1. Targeting patterns

The concentration of attacks on fewer customers, with more attacks per target, indicates a move toward more sophisticated, focused operations.

  1. Attack duration

The shorter average attack duration (17.6 minutes) combined with increased frequency suggests a tactical shift toward ‘pulse’ style attacks rather than sustained campaigns.

Looking ahead

While individual attack intensities have decreased significantly year-over-year, the dramatic increase in frequency and focus on specific targets suggests an evolution in threat actors’ strategies. The pattern of increased 4Q activity appears to be holding true, though manifesting differently than in previous years.

Organisations should prepare for:

Continent 8’s DDoS mitigation solution

Our best-in-class DDoS solution continues to evolve and in recent months we have amplified our scrubbing capacity to 5+ Tbps, as well as increased our scrubbing centres geographically deployed across multiple continents. Locations include Los Angeles, Chicago, New York, Miami, London, Amsterdam, Frankfurt, Singapore, Hong Kong and Sao Paulo.

Key features of our mitigation solution:

DDoS protection should also form part of a wider, multi-layered approach to cybersecurity. A 360-degree, end-to-end protection strategy should include DDoS mitigation solution as well as WAF/WAAP protectionMDR/EDR servicesSIEM and SOC resourcesVAPT assessmentsbackup solutions, and mobile devicephishing defence and MFA services.

This is the only way to have multiple protections in place for each attack type and to ensure the greatest level of resilience.

To learn more about how Continent 8 can help protect your organisation, contact a member of the team via sales@continent8.com or our Contact Us form.

Jerad Swimmer, Regional Sales Director at Continent 8 Technologies, explores the benefits of Vulnerability Assessment and Penetration Testing (VAPT).

Jerad

Tribal casinos are experiencing substantial financial growth. As highlighted in my previous blog, 2023 was a landmark year for the tribal gaming sector, with revenues hitting a record $41.9 billion USD, as reported by the National Indian Gaming Commission. Consequently, tribal casinos are increasingly targeted by cybercriminals, with reports suggesting a nearly 60% increase in cyber attacks on tribes in 2023.

With significant financial and personal data at stake, cybersecurity in tribal gaming and casino environments is a critical priority. But where should you start? In this blog, I’ll explain why Vulnerability Assessment and Penetration Testing (VAPT) is the perfect first step to bolster tribal gaming cybersecurity.

What is VAPT?

Let’s begin by defining VAPT. Craig Lusher, our Product Principal of Secure Solutions, describes VAPT as the following:

“VAPT is defined as a comprehensive set of cybersecurity services that helps organizations identify, assess and mitigate vulnerabilities in their IT infrastructure, applications and networks. Periodic Vulnerability Assessments (VAs) scan to detect exploitable vulnerabilities in customer networks and infrastructure and record them in a register, prioritizing remedial work and demonstrating continuous improvement. Penetration Tests (PTs) use identified vulnerabilities to further exploit and gain access, testing the efficacy of preventative security measures, procedures and technology.”

By simulating real-world cyber attacks, pentesting enables tribal casino IT and cybersecurity teams to identify system weaknesses and address potential vulnerabilities before they can be exploited by malicious actors. This strategy not only strengthens the casino environment but also ensures that cybersecurity measures remain robust and adaptable to evolving threats.

Advantage #1: Hardened cybersecurity posture

VAPT aims to establish what we at Continent 8 call a “hardened cybersecurity posture.”

A hardened cybersecurity posture integrates multiple protective layers, adhering to best practices for adaptability to threats and changes. It begins with technical controls such as network segmentation, access management and encryption, complemented by active defenses including web application and API protection, intrusion detection and cybersecurity monitoring. This approach is guided by policies and procedures for incident response and risk management.

The core components of a hardened cybersecurity posture create a robust defense system. Technical controls prevent attacks, while monitoring systems identify threats. Regular assessments are conducted to uncover vulnerabilities and governance ensures consistent implementation. This comprehensive approach ensures that even if one safeguard fails, multiple other layers remain to protect assets.

Advantage #2: Essential for audit success

Implementing VAPT protocols is a beneficial practice for any tribal gaming organization. These measures not only bolster cybersecurity but also streamline internal and external audits.

By maintaining detailed records of testing and remediation efforts, casinos can demonstrate their commitment to cybersecurity to auditors. This transparency not only aids in passing audits but also enhances the casino’s reputation as a reliable and secure establishment.

Advantage #3: Proactive defense

Regular penetration testing provides tribal casinos with ongoing monitoring and enhancement of cybersecurity protocols, helping them stay ahead of potential cyber threats. This ensures a safer and more secure environment for both operations and players, while also building trust with internal and external parties and stakeholders. This proactive approach, again, is vital in preserving the casino’s integrity and reputation.

Key considerations for pentesting tools

When choosing penetration testing tools for tribal casino and gaming cybersecurity, select tools that offer comprehensive coverage, capable of evaluating a wide range of vulnerabilities across multiple systems and applications.

A comprehensive VAPT service should encompass the following:

For more information on VAPT or to book a meeting with me at TribalHub Cybersecurity Summit or the Indian Game Tradeshow (Booth 18), contact me at jerad.swimmer@continent8.com.

Cybersecurity solutions for a safer tomorrow

Continent 8 provides comprehensive, multi-layered threat prevention, detection and response solutions to secure your tribal organization’s digital assets in the face of evolving cyber threats. For more information on how Continent 8 can support your cybersecurity initiatives, email sales@continent.com or fill out our Contact Us page.

Also, be sure to watch the latest episode in our Tribal Talks: Cybersecurity Unlocked podcast series – also available on Spotify – to gain a deeper understanding of the technological advancements, cybersecurity challenges and best practices shaping tribal gaming landscape.

Craig Lusher from our Secure team provides a comprehensive analysis of the latest DDoS statistics from the third quarter of the year and their implications for cybersecurity trends.

 

Overview of 3Q 2024

The third quarter of 2024 has continued to show relatively low DDoS attack activity, with 37 attacks recorded. This represents a slight increase from 2Q’s 32 attacks but remains significantly lower than the 359 attacks recorded in 3Q 2023. The most active month was July, which aligns with historical patterns of increased summer activity.

Attack intensity and scale

3Q 2024 showed some interesting patterns in attack intensity:

This quarter’s largest attack (16.8 Gbps) represents a significant decrease from 2Q 2024’s peak of 85.5 Gbps. For perspective, this is dramatically lower than the massive attacks seen in 2023, which peaked at 560.6 Gbps in Q2 2023, and over 1Tbps prior to that.

Customer impact analysis

Key statistics for 3Q 2024:

Quarterly comparison and trends

Comparing 3Q 2024 with recent quarters reveals several interesting trends:

  1. Attack volume stabilization

This shows a relative stabilisation at lower attack volumes compared to 2023’s numbers.

  1. Attack intensity evolution

While more intense than 1Q, 3Q’s attacks remained relatively moderate compared to historical peaks.

  1. Customer impact patterns

The consistent number of affected customers over 2Q and 3Q 2024 suggests a stable threat landscape, though individual customers faced more repeated attacks in 3Q.

Year-over-year analysis

Comparing 3Q 2024 to 3Q 2023 shows a dramatic shift in the threat landscape:

Implications and insights

  1. Attack evolution

The lower volume but moderate intensity of attacks suggests a shift in attacker strategies, possibly focusing on more targeted, strategic attacks rather than broad campaigns.

  1. Attack duration

The average attack duration of 2 hours shows a trend toward longer, more sustained attacks compared to previous quarters, potentially indicating more sophisticated attack strategies.

Looking ahead

While attack volumes remain relatively low compared to 2023 and previous, the increase in attacks per individual customer and attack duration suggests continued evolution in threat actors’ strategies. Organisations should maintain robust DDoS protection despite the lower overall attack volumes, as the pattern of attacks suggests more targeted and potentially more sophisticated approaches.

The historical pattern of increased activity during major sporting events and holiday periods suggests potential for increased activity in the upcoming quarters, particularly with various significant events on the horizon.

This analysis demonstrates the importance of maintaining comprehensive DDoS protection and the value of Continent 8’s multi-layered security approach, even during periods of relatively low attack volume.

Continent 8’s DDoS mitigation solution

Our best-in-class DDoS solution continues to evolve and in recent months we have amplified our scrubbing capacity to 5+ Tbps, as well as increased our scrubbing centres geographically deployed across multiple continents. Locations include Los Angeles, Chicago, New York, Miami, London, Amsterdam, Frankfurt, Singapore, Hong Kong and Sao Paulo.

Key features of our mitigation solution:

DDoS protection should also form part of a wider, multi-layered approach to cybersecurity. A 360-degree, end-to-end protection strategy should include DDoS mitigation solution as well as WAF/WAAP protectionMDR/EDR servicesSIEM and SOC resourcesVAPT assessmentsbackup solutions, and mobile device and phishing defence services.

This is the only way to have multiple protections in place for each attack type and to ensure the greatest level of resilience.

To learn more about how Continent 8 can help protect your organisation, contact a member of the team via sales@continent8.com or our Contact Us form.

Let's work together.

GET IN TOUCH

Asia +65 3165 4649
Europe +44 1624 694625
Latin America +54 11 5168 5637
North America +1 514 461 5120