Canon printer owners: Be careful of bogus driver download sites

Credit to Author: Christopher Boyd| Date: Wed, 11 May 2022 08:43:17 +0000

We look at reports of scams involving fake Canon printer drivers, non-existent downloads, and tech support scams.

The post Canon printer owners: Be careful of bogus driver download sites appeared first on Malwarebytes Labs.

Read more

Adding Guardrails To A Cloud Account After The Fact

Credit to Author: Melanie Tafelski| Date: Wed, 11 May 2022 00:00:00 +0000

This article outlines a priority checklist of which guardrails need to be applied to an existing cloud account. Answering questions like, can these guardrails be implemented without breaking anything? What level of testing is required?

Read more

Microsoft Patch Tuesday, May 2022 Edition

Credit to Author: BrianKrebs| Date: Wed, 11 May 2022 02:34:59 +0000

Microsoft today released updates to fix at least 74 separate security problems in its Windows operating systems and related software. This month’s patch batch includes fixes for seven “critical” flaws, as well as a zero-day vulnerability that affects all supported versions of Windows.

Read more

APT34 targets Jordan Government using new Saitama backdoor

Credit to Author: Threat Intelligence Team| Date: Tue, 10 May 2022 20:49:30 +0000

On April 26th, we identified a suspicious email that targeted a government official from Jordan’s foreign ministry. The email contained a malicious Excel document that drops a new backdoor named Saitama. Following our investigation, we were able to attribute this attack to the known Iranian Actor APT34. Also known as OilRig/COBALT GYPSY/IRN2/HELIX KITTEN, APT34 is…

The post APT34 targets Jordan Government using new Saitama backdoor appeared first on Malwarebytes Labs.

Read more

Microsoft security experts outline next steps after compromise recovery

Credit to Author: Christine Barrett| Date: Tue, 10 May 2022 16:00:00 +0000

A compromise recovery, in general, means that we are implementing several years of work in cybersecurity in only six weeks. It is intense, and it changes how administrators work and how systems break. The main goals are to take back control, keep that control, and add this mindset to the customer.

The post Microsoft security experts outline next steps after compromise recovery appeared first on Microsoft Security Blog.

Read more

Client side scanning may cost more than it delivers

Credit to Author: Pieter Arntz| Date: Tue, 10 May 2022 13:04:04 +0000

On May 11, 2022, the EU will publicize a proposal for a law on mandatory chat control. Privacy advocates aren’t happy.

The post Client side scanning may cost more than it delivers appeared first on Malwarebytes Labs.

Read more