The EU Wants Big Tech to Scan Your Private Chats for Child Abuse

Credit to Author: Matt Burgess| Date: Wed, 11 May 2022 15:45:20 +0000
Europe’s proposed child protection laws could undermine end-to-end encryption for billions of people.
Read MoreRSS Reader for Computer Security Articles

Credit to Author: Matt Burgess| Date: Wed, 11 May 2022 15:45:20 +0000
Europe’s proposed child protection laws could undermine end-to-end encryption for billions of people.
Read More
Credit to Author: Lily Hay Newman| Date: Wed, 11 May 2022 11:00:00 +0000
A surprising number of the top 100,000 websites effectively include keyloggers that covertly snag everything you type into a form.
Read More
Credit to Author: Editorial Team| Date: Wed, 11 May 2022 18:11:21 +0000
Time to update Windows! Microsoft released patches for several vulnerabilities, including CVE-2022-26925 that is being actively exploited by cybercriminals.
Read MoreCredit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Wed, 11 May 2022 16:00:00 +0000
The Center for Threat-Informed Defense, along with Microsoft and industry partners, collaborated on a repeatable methodology and a web-based calculator, aiming to streamline MITRE ATT&CK® use for defenders.
The post Center for Threat-Informed Defense, Microsoft, and industry partners streamline MITRE ATT&CK® matrix evaluation for defenders appeared first on Microsoft Security Blog.
Read MoreCredit to Author: Pieter Arntz| Date: Wed, 11 May 2022 14:36:23 +0000
May’s Patch Tuesday includes one actively exploited zero-day vulnerability and some other interesting ones.
The post Update now! Microsoft releases patches, including one for actively exploited zero-day appeared first on Malwarebytes Labs.
Read MoreCredit to Author: Christopher Boyd| Date: Wed, 11 May 2022 08:43:17 +0000
We look at reports of scams involving fake Canon printer drivers, non-existent downloads, and tech support scams.
The post Canon printer owners: Be careful of bogus driver download sites appeared first on Malwarebytes Labs.
Read More
Credit to Author: Melanie Tafelski| Date: Wed, 11 May 2022 00:00:00 +0000
This article outlines a priority checklist of which guardrails need to be applied to an existing cloud account. Answering questions like, can these guardrails be implemented without breaking anything? What level of testing is required?
Read MoreCredit to Author: Threat Intelligence Team| Date: Tue, 10 May 2022 20:49:30 +0000
On April 26th, we identified a suspicious email that targeted a government official from Jordan’s foreign ministry. The email contained a malicious Excel document that drops a new backdoor named Saitama. Following our investigation, we were able to attribute this attack to the known Iranian Actor APT34. Also known as OilRig/COBALT GYPSY/IRN2/HELIX KITTEN, APT34 is…
The post APT34 targets Jordan Government using new Saitama backdoor appeared first on Malwarebytes Labs.
Read More