GitHub comments abused to push password stealing malware masked as fixes
GitHub is being abused to distribute the Lumma Stealer information-stealing malware as fake fixes posted in project comments....
Docker-OSX image used for security research hit by Apple DMCA takedown
The popular Docker-OSX project has been removed from Docker Hub after Apple filed a DMCA (Digital Millennium Copyright...
Telegram: ‘The dark web in your pocket’
The arrest of Telegram’s chief executive in France has ignited a debate about moderation on his app. Source::...
Organizational Units in AWS Control Tower can now contain up to 1,000 accounts
AWS Control Tower now allows you to register Organizational Units (OUs) containing up to 1,000 accounts. With this...
Musk’s X suspended in Brazil after ruling by judge
The social media giant says it refused to comply with a judge’s order to appoint a legal representative....
Amazon Redshift Serverless now supports AWS PrivateLink
Amazon Redshift Serverless now supports AWS PrivateLink (interface VPC endpoint) to connect to Amazon Redshift Serverless. You can...
Microsoft is trying to reduce Windows 11’s desktop spotlight clutter
Windows 11’s Spotlight feature is a pretty nice way to jazz up your desktop background with different wallpapers...
AWS IoT SiteWise models now support versioning
AWS IoT SiteWise now supports asset model and component model versioning. This new capability is designed to help...
Researchers find SQL injection to bypass airport TSA security checks
Security researchers have found a vulnerability in a key air transport security system that allowed unauthorized individuals to...
AWS Security Hub launches 8 new security controls
AWS Security Hub has released 8 new security controls, increasing the total number of controls offered to 423....
New Voldemort malware abuses Google Sheets to store stolen data
A campaign that started on August 5, 2024, is spreading a previously undocumented malware named “Voldemort” to organizations...
Cisco ties AppDynamics to Microsoft Azure for cloud application management
Cisco is now offering its AppDynamics application management suite as part of Microsoft Azure cloud services. The integration...
North Korean hackers exploit Chrome zero-day to deploy rootkit
North Korean hackers have exploited a recently patched Google Chrome zero-day (CVE-2024-7971) to deploy the FudModule rootkit after...
AWS Backup extends support for Cross-Region backup with Amazon Neptune
Today, we are announcing the availability of AWS Backup support for cross-Region backup of Amazon Neptune backups in...
AWS Config conformance packs now available in 12 additional AWS Regions
AWS Config conformance packs and organization-level management capabilities for conformance packs and individual AWS Config rules are now...
AWS WAF enhances rate-based rules to support lower rate limits
AWS WAF now supports setting lower rate limit thresholds for rate-based rules. Customers can now configure rate-based rules...
Amazon EMR Managed Scaling is now Application Master placement aware
Today, we are excited to announce a new enhancement in EMR Managed Scaling that improves application resiliency and...
Amazon Personalize enhances automatic solution training
Amazon Personalize is excited to introduce the ability for developers to modify automatic training configurations after a Personalize...
AWS Amplify introduces new function capabilities with scheduled cron jobs and streaming logs
AWS Amplify now offers two new features for its Functions capability: Scheduled Cron Jobs and Streaming Logs. Cron...
Fast Inversion for Real-Time Image Editing with Text
Text-to-image diffusion models can generate diverse, high-fidelity images based on user-provided text prompts. They operate by mapping a...