T-Mobile confirms it was hacked in recent wave of telecom breaches
T-Mobile confirms it was hacked in the wave of recently reported telecom breaches conducted by Chinese threat actors...
GitHub projects targeted with malicious commits to frame researcher
GitHub projects have been targeted with malicious commits and pull requests, in an attempt to inject backdoors into these projects. Most...
PAN-OS Firewall Vulnerability Under Active Exploitation – IoCs Released
Palo Alto Networks has released new indicators of compromise (IoCs) a day after the network security vendor confirmed...
Warning: DEEPDATA Malware Exploiting Unpatched Fortinet Flaw to Steal VPN Credentials
A threat actor known as BrazenBamboo has exploited an unresolved security flaw in Fortinet’s FortiClient for Windows to...
NVIDIA NIM 1.4 Ready to Deploy with 2.4x Faster Inference
The demand for ready-to-deploy high-performance inference is growing as generative AI reshapes industries. NVIDIA NIM provides production-ready microservice…...
Amazon SageMaker Notebook Instances now support Trainium1 and Inferentia 2 based instances
We are pleased to announce general availability of Trainium1 and Inferentia2 based EC2 instances on SageMaker Notebook Instances....
AWS Application Load Balancer announces CloudFront integration with built-in WAF
We are announcing a new one-click integration on Application Load Balancer (ALB) to attach an Amazon CloudFront distribution...
NSO Group used another WhatsApp zero-day after being sued, court docs say
Israeli surveillance firm NSO Group reportedly used multiple zero-day exploits, including an unknown one named “Erised,” that leveraged...
AI, cybersecurity drive IT investments and lead skill shortages for 2025
AI and cybersecurity are driving enterprise tech investments and at the same time exposing the talent gaps that...
AWS IoT Core adds capabilities to enrich MQTT messages and simplify permission management
AWS IoT Core, a managed cloud service that lets you securely connect Internet of Things (IoT) devices to...
Amazon CloudWatch launches Observability Solutions for AWS Services and Workloads on AWS
Observability solutions help you get up-and-running faster with infrastructure and application monitoring at AWS. They are intended for...
Amazon Data Firehose supports continuous replication of database changes to Apache Iceberg Tables in Amazon S3
Amazon Data Firehose now enables capture and replication of database changes to Apache Iceberg Tables in Amazon S3...
Introducing Amazon Route 53 Resolver DNS Firewall Advanced
Today, AWS announced Amazon Route 53 Resolver DNS Firewall Advanced, a new set of capabilities on Route 53...
Botnet exploits GeoVision zero-day to install Mirai malware
A malware botnet is exploiting a zero-day vulnerability in end-of-life GeoVision devices to compromise and recruit them for...
Amazon Time Sync Service supports Microsecond-Accurate Time in Stockholm Region
The Amazon Time Sync Service now supports clock synchronization within microseconds of UTC on Amazon EC2 instances in...
AWS Organizations member accounts can now regain access to accidentally locked Amazon S3 buckets
AWS Organizations member accounts can now use a simple process through AWS Identity and Access Management (IAM) to...
FTC reports 50% drop in unwanted call complaints since 2021
On Friday, the U.S. Federal Trade Commission (FTC) reported that the number of consumer complaints about unwanted telemarketing...
AWS Partner CRM Connector Adds Partner Central API Support
Starting today, the AWS Partner CRM Connector further simplifies co-sell actions between Salesforce and AWS Partner Central through APN Customer...
AWS Control Tower launches configurable managed controls implemented using resource control policies
Today we are excited to announce the launch of AWS managed controls implemented using resource control policies (RCPs)...
AWS Transfer Family is now available in the AWS Asia Pacific (Malaysia) Region
Customers in AWS Asia Pacific (Malaysia) Region can now use AWS Transfer Family. AWS Transfer Family provides fully...