Amazon Redshift gets new default settings to prevent data breaches
Amazon has announced key security enhancements for Redshift, a popular data warehousing solution, to help prevent data exposures...
Taiwan chip tariff would cause industry harm, analysts say
President Donald Trump continues to use tariffs like a club to get his way, and is threatening to...
Google fixes Android kernel zero-day exploited in attacks
The January 2025 Android security updates patch 48 vulnerabilities, including a zero-day kernel vulnerability tagged as exploited in...
AWS Batch launches new features for access control and management of AWS Batch on EKS workloads
AWS Batch on EKS now supports configurable Kubernetes namespaces, Persistent Volume Claims (PVCs), subPath to Kubernetes pod container...
Canadian charged with stealing $65 million using DeFI crypto exploits
The U.S. Justice Department has charged a Canadian man with stealing roughly $65 million after exploiting two decentralized...
Linux Foundation’s L3AF brings zero-downtime updates to eBPF network management
A challenge for enterprises that operate large-scale network infrastructure has long been how to maintain performance while updating...
Casio UK online store hacked to steal customer credit cards
Casio UK’s e-shop at casio.co.uk was hacked to include malicious scripts that stole credit card and customer information between January...
Amazon EC2 now supports automated recovery of Microsoft SQL Server with VSS
Amazon EC2 now supports automated recovery of Microsoft SQL Server databases from Volume Shadow Copy Services (VSS) based...
AWS CodeBuild now integrates with Buildkite
AWS CodeBuild now offers native support for self-hosted Buildkite runners, enabling you to execute Buildkite pipeline jobs within...
Amazon RDS for SQL Server supports new minor version in December 2024
A new minor version of Microsoft SQL Server is now available on Amazon RDS for SQL Server, providing...
Amazon Connect now supports configuration of which states an agent can be in when adhering to their schedule
Amazon Connect now provides the ability to choose which states an agent can be in when adhering to...
Microsoft kills off Defender ‘Privacy Protection’ VPN feature
Microsoft announced it is killing off its Privacy Protection VPN feature in the Microsoft Defender app at the end...
Thinking of moving off VMware? Gartner tallies cost of large-scale VMware migration
Broadcom’s $61 billion acquisition of VMware caused quite a stir in the technology industry and continues to prompt...
DeepSeek AI tools impersonated by infostealer malware on PyPI
Threat actors are taking advantage of the rise in popularity of the DeepSeek to promote two malicious infostealer packages...
Download the Agentic AI Enterprise Spotlight
Download the February 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, InfoWorld, and...
768 CVEs Exploited in 2024, Reflecting a 20% Increase from 639 in 2023
As many as 768 vulnerabilities with designated CVE identifiers were reported as exploited in the wild in 2024,...
PyPI Introduces Archival Status to Alert Users About Unmaintained Python Packages
The maintainers of the Python Package Index (PyPI) registry have announced a new feature that allows package developers...
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 February]
This week, our news radar shows that every new tech idea comes with its own challenges. A hot...
Coyote Malware Expands Reach: Now Targets 1,030 Sites and 73 Financial Institutions
Brazilian Windows users are the target of a campaign that delivers a banking malware known as Coyote. “Once...
What Is Attack Surface Management?
Attack surfaces are growing faster than security teams can keep up – to stay ahead, you need to...