Practical Guidance For Securing Your Software Supply Chain
The heightened regulatory and legal pressure on software-producing organizations to secure their supply chains and ensure the integrity...
Apple Patches AirPods Bluetooth Vulnerability That Could Allow Eavesdropping
Apple has released a firmware update for AirPods that could allow a malicious actor to gain access to...
Optical networking challenges gain attention as AI networking demands rise
As large enterprise and hyperscaler networks process increasingly greater AI workloads and other applications that require high-bandwidth performance,...
New Credit Card Skimmer Targets WordPress, Magento, and OpenCart Sites
Multiple content management system (CMS) platforms like WordPress, Magento, and OpenCart have been targeted by a new credit...
New Medusa Android Trojan Targets Banking Users Across 7 Countries
Cybersecurity researchers have discovered an updated version of an Android banking trojan called Medusa that has been used...
Over 110,000 Websites Affected by Hijacked Polyfill Supply Chain Attack
Google has taken steps to block ads for e-commerce sites that use the Polyfill.io service after a Chinese...
VW to invest up to $5bn in Tesla rival Rivian
Shares in the US-based electric truck and SUV maker jumped by around 50% after the announcement. Source:: BBC...
AI21 Labs’ Jamba-Instruct model now available in Amazon Bedrock
AI21 Labs’ Jamba-Instruct, a powerful instruction-following large language model, is now available in Amazon Bedrock. Fine-tuned for instruction...
Amazon CodeCatalyst now supports GitLab.com source code repositories
Amazon CodeCatalyst now supports the use of source code repositories hosted in GitLab.com in CodeCatalyst projects. This allows...
Issue #635 (June 25, 2024)
#635 – JUNE 25, 2024 PEP 2026: Calendar Versioning for Python This PEP proposes updating the versioning scheme...
Tech Life: Detecting cancer using AI
The role machine learning can play in accurate blood tests for bowel cancer. Source:: BBC News – Technology
Plugins on WordPress.org backdoored in supply chain attack
A threat actor modified the source code of at least five plugins hosted on WordPress.org to include malicious PHP...
Polyfill.io JavaScript supply chain attack impacts over 100K sites
Over 100,000 sites have been impacted in a supply chain attack by the Polyfill.io service after a Chinese company acquired...
Tata Communications partners with Versa Networks on hosted SASE
Tata Communications has entered the fast-growing SASE market with a hosted offering for global enterprises. It said that...
New Medusa malware variants target Android users in seven countries
The Medusa banking trojan for Android has re-emerged after almost a year of keeping a lower profile in...
Amazon Aurora now provides additional monitoring information during upgrades
Amazon Aurora now provides additional granular monitoring information during upgrades for enhanced observability. Customers can use the additional...
Amazon DocumentDB announces IAM database authentication
Amazon DocumentDB (with MongoDB compatibility) now supports cluster authentication with AWS Identity and Access Management (IAM) users and...
Amazon EC2 C6a instances now available in additional regions
Starting today, the general-purpose Amazon EC2 C6a instances are now available in Asia Pacific (Hong Kong) region. C6a...
Amazon ElastiCache supports M7g and R7g Graviton3-based nodes in additional AWS regions
Amazon ElastiCache now supports Graviton3-based M7g and R7g node families. ElastiCache Graviton3 nodes deliver improved price-performance compared to...
Amazon Redshift Serverless with lower base capacity available in the Asia Pacific (Mumbai) Region
Amazon Redshift now allows you to get started with Amazon Redshift Serverless with a lower data warehouse base...