E.U. Proposes New Rules for Tech Companies to Combat Online Child Sexual Abuse

The European Commission on Wednesday proposed new regulation that would require tech companies to scan for child sexual abuse material (CSAM) and grooming behavior, raising worries that it could undermine end-to-end encryption (E2EE).
To that end, onl… Continue reading E.U. Proposes New Rules for Tech Companies to Combat Online Child Sexual Abuse

Posted in Uncategorized

Android and Chrome Users Can Soon Generate Virtual Credit Cards to Protect Real Ones

Google on Wednesday took to its annual developer conference to announce a host of privacy and security updates, including support for virtual credit cards on Android and Chrome.
“When you use autofill to enter your payment details at checkout, virtual… Continue reading Android and Chrome Users Can Soon Generate Virtual Credit Cards to Protect Real Ones

Posted in Uncategorized

CISA Urges Organizations to Patch Actively Exploited F5 BIG-IP Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the recently disclosed F5 BIG-IP flaw to its Known Exploited Vulnerabilities Catalog following reports of active abuse in the wild.
The flaw, assigned the identifier CVE-2022-1… Continue reading CISA Urges Organizations to Patch Actively Exploited F5 BIG-IP Vulnerability

Posted in Uncategorized

Researchers Warn of Nerbian RAT Targeting Entities in Italy, Spain, and the U.K.

A previously undocumented remote access trojan (RAT) written in the Go programming language has been spotted disproportionately targeting entities in Italy, Spain, and the U.K.
Called Nerbian RAT by enterprise security firm Proofpoint, the novel malwa… Continue reading Researchers Warn of Nerbian RAT Targeting Entities in Italy, Spain, and the U.K.

Posted in Uncategorized