Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software DNS Inspection Denial of Service Vulnerability
A vulnerability in the DNS inspection handler of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense...
2024 global network outage report and internet health check
The reliability of services delivered by ISPs, cloud providers and conferencing services is critical for enterprise organizations. ThousandEyes, a...
2024 global network outage report and internet health check
The reliability of services delivered by ISPs, cloud providers and conferencing services is critical for enterprise organizations. ThousandEyes, a...
Making a case for case statements on Linux
If you’ve never used bash case statements, you might be very surprised by how easily they allow you...
Making a case for case statements on Linux
If you’ve never used bash case statements, you might be very surprised by how easily they allow you...
AMD holds steady against Intel in Q1
Intel managed to slow the momentum of AMD’s ascent for the first quarter of 2024. But year-over-year, AMD...
Researchers Warn of Chinese-Aligned Hackers Targeting South China Sea Countries
Cybersecurity researchers have disclosed details of a previously undocumented threat group called Unfading Sea Haze that’s believed to have been...
Cisco research highlights network complexity, security challenges
Today’s enterprises need more help managing and securing their distributed networking environments than they ever have, Cisco concludes...
Expanding Regional Services configuration flexibility for customers
This post is also available in Français, Español, Nederlands, Deutsch, Português do Brasil and عربي. When we launched...
AI Gateway is generally available: a unified interface for managing and scaling your generative AI workloads
This post is also available in 简体中文, 繁體中文, 日本語, 한국어. During Developer Week in April 2024, we announced...
Rockwell Advises Disconnecting Internet-Facing ICS Devices Amid Cyber Threats
Rockwell Automation is urging its customers to disconnect all industrial control systems (ICSs) not meant to be connected...
BT to refund EE & Plusnet customers over exit fees
The telecoms giant did not provide clear details of contract lengths and exit fees to customers. Source:: BBC...
AWS clarifies Nvidia chip order: Upgrade, not halt
In a reversal of earlier reports, Amazon Web Services (AWS) has clarified that it has not halted orders...
The Ultimate SaaS Security Posture Management Checklist, 2025 Edition
Since the first edition of The Ultimate SaaS Security Posture Management (SSPM) Checklist was released three years ago, the corporate...
Stealers, stealers and more stealers
Introduction Stealers are a prominent threat in the malware landscape. Over the past year we published our research...
GHOSTENGINE Exploits Vulnerable Drivers to Disable EDRs in Cryptojacking Attack
Cybersecurity researchers have discovered a new cryptojacking campaign that employs vulnerable drivers to disable known security solutions (EDRs)...
Amazon EC2 M7i-flex, M7i, and C7i instances are now available in AWS GovCloud (US-East) Region
Starting today, Amazon Elastic Compute Cloud (Amazon EC2) M7i-flex, M7i, and C7i instances powered by custom 4th Generation...
MS Exchange Server Flaws Exploited to Deploy Keylogger in Targeted Attacks
An unknown threat actor is exploiting known security flaws in Microsoft Exchange Server to deploy a keylogger malware...
QNAP Patches New Flaws in QTS and QuTS hero Impacting NAS Appliances
Taiwanese company QNAP has rolled out fixes for a set of medium-severity flaws impacting QTS and QuTS hero,...
Zoom Adopts NIST-Approved Post-Quantum End-to-End Encryption for Meetings
Popular enterprise services provider Zoom has announced the rollout of post-quantum end-to-end encryption (E2EE) for Zoom Meetings, with...