ConfD CLI Privilege Escalation and Arbitrary File Read and Write Vulnerabilities
Multiple vulnerabilities in the ConfD CLI could allow an authenticated, low-privileged, local attacker to read and write arbitrary...
New Consent and Bot Management features for Cloudflare Zaraz
Managing consent online can be challenging. After you’ve figured out the necessary regulations, you usually need to configure...
NVIDIA Presents New Robotics Research on Geometric Fabrics, Surgical Robots, and More at ICRA
During the IEEE International Conference on Robotics and Automation (ICRA) May 13-17 in Yokohama, Japan, many people will...
Turla Group Deploys LunarWeb and LunarMail Backdoors in Diplomatic Missions
An unnamed European Ministry of Foreign Affairs (MFA) and its three diplomatic missions in the Middle East were...
NIST Awards Over $1.2 Million to Small Businesses to Advance Cybersecurity, Biopharmaceuticals, Semiconductors and More
The awards will fund research and development of new products relating to cybersecurity, quantum computing, health care, semiconductor...
Amazon Detective adds support for EKS audit logs in Security Lake integration
Amazon Detective now supports retrieving Amazon Elastic Kubernetes Service (Amazon EKS) audit logs from Amazon Security Lake. With...
AWS HealthImaging supports cross account data imports
AWS HealthImaging now supports cross-account and cross-region import jobs. With this release, customers can directly import DICOM data...
AWS Shield Advanced is now available in Canada West (Calgary) Region
Starting today, you can use AWS Shield Advanced in the AWS Canada West (Calgary) Region. AWS Shield Advanced...
Amazon Managed Grafana now supports Grafana version 10.4
Customers can now run Amazon Managed Grafana workspaces with Grafana version 10.4. This release includes features that were...
Amazon VPC Lattice now supports TLS Passthrough
Today, AWS announces the general availability of TLS Passthrough for Amazon VPC Lattice, which allows customers to enable...
Period trackers ‘coercing’ women into sharing risky information
Research finds poor data management practices such as not being able to delete data about abortions. Source:: BBC...
(Cyber) Risk = Probability of Occurrence x Damage
Here’s How to Enhance Your Cyber Resilience with CVSS In late 2023, the Common Vulnerability Scoring System (CVSS)...
Ebury Botnet Malware Compromises 400,000 Linux Servers Over Past 14 Years
A malware botnet called Ebury is estimated to have compromised 400,000 Linux servers since 2009, out of which more than...
It’s Time to Master the Lift & Shift: Migrating from VMware vSphere to Microsoft Azure
While cloud adoption has been top of mind for many IT professionals for nearly a decade, it’s only in recent...
Dutch Court Sentences Tornado Cash Co-Founder to 5 Years in Prison for Money Laundering
A Dutch court on Tuesday sentenced one of the co-founders of the now-sanctioned Tornado Cash cryptocurrency mixer service to 5...
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
Microsoft has addressed a total of 61 new security flaws in its software as part of its Patch Tuesday updates for...
Amazon EKS announces native support for autoscaling CoreDNS Pods
Today, AWS announces general availability of CoreDNS autoscaling capabilities for Amazon EKS clusters. This feature allows you to...
Amazon RDS for PostgreSQL announces Extended Support minor 11.22-RDS.20240418
Amazon Relational Database Service (RDS) for PostgreSQL announces Amazon RDS Extended Support minor version 11.22-RDS.20240418. We recommend that...
AWS CodeBuild now supports connecting to an Amazon VPC from reserved capacity
AWS CodeBuild now supports connecting your fleet of reserved Linux hosts to your Amazon VPC. Reserved capacity allows...
Amazon Connect Contact Lens now provides analytics for Flows and Flow Modules
Amazon Connect Contact Lens now offers analytics for Flows and Flow Modules, enabling you to identify emergent issues...