Data center colocation provider Cyxtera files for bankruptcy
Colocation provider Cyxtera Technologies has filed for Chapter 11 bankruptcy after spending the last few months trying to...
Single Region Terraform support now available for AWS Control Tower Account Factory
AWS Control Tower now offers single-region support for Terraform through account factory customization. You can now customize new...
Amazon EC2 I4i is available in AWS GovCloud (US) and Africa Regions
Starting today, storage optimized Amazon EC2 I4i instances are now also available in the AWS GovCloud (US-West, US-East)...
Amazon DocumentDB 5.0 now supports Amazon EC2 t3.medium and r5 instances
Amazon DocumentDB 5.0 extends instance support to Amazon EC2 t3.medium and r5 instances, in addition to previously supported...
Amazon Aurora now supports R6i database instance in Europe (Frankfurt) Region
Amazon Aurora R6i database instances are now generally available in the Europe (Frankfurt) Region for Amazon Aurora PostgreSQL-...
WWDC: 18+ ways Apple plans to make you more secure
Vision Pro, Apple Silicon, Macs, new enterprise tools — and privacy protection were all among the many WWDC announcements...
Google to start factoring office attendance into performance reviews
Google has updated its hybrid work policy, cracking down on employees who aren’t consistently working from the office....
Experts Unveil PoC Exploit for Recent Windows Vulnerability Under Active Exploitation
Details have emerged about a now-patched actively exploited security flaw in Microsoft Windows that could be abused by...
Cloudflare Area 1 earns SOC 2 report
Cloudflare Area 1 is a cloud-native email security service that identifies and blocks attacks before they hit user...
Clop Ransomware Gang Likely Exploiting MOVEit Transfer Vulnerability Since 2021
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) have published a joint...
A New Look for NICE
NICE got its start in 2008 via the Comprehensive National Cybersecurity Initiative and over the last 15 years...
NIST Releases Interagency Report 8406: Cybersecurity Framework Profile for Liquefied Natural Gas
The National Cybersecurity Center of Excellence (NCCoE) has published the final version of NIST Interagency Report (NIST IR)...
How to Improve Your API Security Posture
APIs, more formally known as application programming interfaces, empower apps and microservices to communicate and share data. However,...
How to use the new AI writing tool in Google Docs and Gmail
Joining the generative AI gold rush, Google last month announced plans to bring several AI-powered tools, collectively called...
Don’t panic! These scammers don’t actually have photos of you
Imagine this: You open your email and find the following message: “I am a hacker, and I’ve gained access...
Urgent Security Updates: Cisco and VMware Address Critical Vulnerabilities
VMware has released security updates to fix a trio of flaws in Aria Operations for Networks that could result in...
Kimsuky Targets Think Tanks and News Media with Social Engineering Attacks
The North Korean nation-state threat actor known as Kimsuky has been linked to a social engineering campaign targeting experts in...
Barracuda Urges Immediate Replacement of Hacked ESG Appliances
Enterprise security company Barracuda is now urging customers who were impacted by a recently disclosed zero-day flaw in...
Crypto: 24-hour cooling-off period included in ad overhaul
Crypto bosses could face up to two years’ imprisonment if they fail to comply with the new rules....
Mind how you use brain data, privacy watchdog warns
An increasing number of companies are interested in “neurotech”, the information commissioner says. Source:: BBC News – Technology