Apple, platform security, and the next big war
When Apple CEO Tim Cook in 2016 warned of a cybersecurity war, he was specifically discussing the pressure...
Why Telecoms Struggle with SaaS Security
The telecom industry has always been a tantalizing target for cybercriminals. The combination of interconnected networks, customer data,...
Effects of the conflict in Sudan on Internet patterns
On Saturday, April 15, 2023, an armed conflict between rival factions of the military government of Sudan began....
Job cuts may intensify as IBM plans to use AI to replace 30% back office jobs
IBM plans to use artificial intelligence (AI) to replace 7,800 jobs over the next five years, Chief Executive...
Job cuts may intensify as IBM plans to use AI to replace 30% of back office jobs
IBM plans to use artificial intelligence (AI) to replace 7,800 jobs over the next five years, CEO Arvind...
How to shop for network observability tools
Today’s enterprise networks span on-premises and cloud environments, and it has become a lot harder for IT teams...
Businesses, beware: The Motorola ThinkPhone comes with a major caveat
Let me just preface this by saying: No, the saga we’re about to dive into isn’t in any...
White House seeks information on tools used for automated employee surveillance
The White House Office of Science and Technology Policy (OSTP) would soon be releasing a public request for...
Managed Detection and Response in 2022
Kaspersky Managed Detection and Response (MDR) is a service for 24/7 monitoring and response to detected incidents based...
LOBSHOT: A Stealthy, Financial Trojan and Info Stealer Delivered through Google Ads
In yet another instance of how threat actors are abusing Google Ads to serve malware, a threat actor...
North Korea’s ScarCruft Deploys RokRAT Malware via LNK File Infection Chains
The North Korean threat actor known as ScarCruft began experimenting with oversized LNK files as a delivery route for RokRAT...
Alert: Active Exploitation of TP-Link, Apache, and Oracle Vulnerabilities Detected
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added three flaws to the Known Exploited Vulnerabilities (KEV) catalog, based...
AI ‘godfather’ Geoffrey Hinton warns of dangers as he quits Google
Geoffrey Hinton tells the BBC some of the dangers in the artificial intelligence field “are quite scary”. Source::...
Exelon Uses Synthetic Data Generation of Grid Infrastructure to Automate Drone Inspection
Most drone inspections still require a human to manually inspect the video for defects. Training a computer vision...
Amazon Sagemaker Data Wrangler now supports image data preparation
Amazon SageMaker Data Wrangler reduces the time it takes to aggregate and prepare data for machine learning (ML) from...
AWS Elemental MediaConnect adds support for SRT failover
Starting today, AWS Elemental MediaConnect supports failover for streams that have SRT caller or listener sources. You can...
AWS Compute Optimizer now supports filtering by tags
AWS Compute Optimizer now supports the ability to filter your rightsizing recommendations by tags. This includes tag keys,...
Announcing the general availability of AWS Local Zones in Auckland
AWS Local Zones is now available in Auckland, New Zealand. You can now use AWS Local Zones in...
AWS Security Hub adds four new integration partners
AWS Security Hub has added four new integration partners to help customers with their cloud security posture monitoring....
Amazon Aurora Serverless v1 now supports PostgreSQL 13
Amazon Aurora Serverless v1 now supports PostgreSQL major version 13. PostgreSQL 13 includes improved functionality and performance from...