NodeStealer Malware Targets Facebook Ad Accounts, Harvesting Credit Card Data
Threat hunters are warning about an updated version of the Python-based NodeStealer that’s now equipped to extract more...
US proposes breakup of Google to end search monopoly
The technology giant could be forced to sell off Chrome to address its illegal monopoly in online search....
Cyberattack at French hospital exposes health data of 750,000 patients
A data breach at an unnamed French hospital exposed the medical records of 750,000 patients after a threat...
Amazon Connect now supports nine additional languages for forecasting, capacity planning, and scheduling
Amazon Connect now supports nine additional languages for forecasting, capacity planning, and scheduling. New languages now supported include:...
OpenSearch’s vector engine adds support for UltraWarm on Amazon OpenSearch Service
UltraWarm is a fully managed, warm storage tier that’s designed to deliver cost savings on the Amazon OpenSearch...
AWS B2B Data Interchange now supports all X12 transaction sets
AWS B2B Data Interchange now supports all X12 transactions for versions 4010, 4030, 4050, 4060, and 5010. Versions...
AWS Compute Optimizer now supports rightsizing recommendations for Amazon Aurora
AWS Compute Optimizer now provides recommendations for Amazon Aurora DB instances. These recommendations help you identify idle database...
Amazon CloudFront now supports Anycast Static IPs
Amazon CloudFront introduces Anycast Static IPs, providing customers with a dedicated list of IP addresses for connecting to...
Announcing auto migration of EC2 databases to Amazon RDS using AWS Database Migration Service
AWS announces a “1-click move to managed” feature for Amazon Relational Database Service (Amazon RDS) that enables you...
AWS re:Post Private is now integrated with Amazon Bedrock to offer contextual knowledge to organizations
Today, AWS re:Post Private announces its integration with Amazon Bedrock, ushering in a new era of contextualized knowledge...
AWS Compute Optimizer now supports idle resource recommendation
Today, AWS announces that AWS Compute Optimizer now supports recommendations to help you identify idle AWS resources. With...
Bigger and badder: how DDoS attack sizes have evolved over the last decade
Distributed Denial of Service (DDoS) attacks are cyberattacks that aim to overwhelm and disrupt online services, making them...
Amazon QuickSight supports fine grained permissions for capabilities with APIs for IAM Identity Center users
Amazon QuickSight now supports user level custom permissions profile assignment for IAM Identity Center users. Custom permissions profiles...
Amazon Kinesis Data Streams On-Demand mode supports streams writing up to 10GB/s
Amazon Kinesis Data Streams On-Demand Mode now automatically scales to support streaming applications that write up to 10GB/s...
Advancing Neuroscience Research with Visual Question Answering and Multimodal Retrieval
Leading healthcare organizations are turning to generative AI to help build applications that can deliver life-saving impacts. These...
Amazon Application Recovery Controller zonal shift and zonal autoshift now support Amazon EKS in the GovCloud (US) Regions
Amazon Application Recovery Controller (ARC) zonal shift and zonal autoshift have expanded their capabilities and now support Amazon...
AWS Control Tower improves Hooks management for proactive controls and extends proactive controls support in additional regions
Today, we are excited to release an improved AWS CloudFormation Hooks management capability for AWS Control Tower proactive...
Amazon WorkSpaces Secure Browser now supports inline data redaction
Today, AWS End User Computing Services announced customers may now redact specified data fields in web content accessed...
Top 5 fastest-growing cities for data centers
The five fastest-growing hubs for data center expansion include an interesting mix of urban areas that have one...
Fintech giant Finastra investigates data breach after SFTP hack
Finastra has confirmed it warned customers of a cybersecurity incident after a threat actor began selling allegedly stolen...