Microsoft Defender Flaw Exploited to Deliver ACR, Lumma, and Meduza Stealers
A now-patched security flaw in the Microsoft Defender SmartScreen has been exploited as part of a new campaign...
CISA Adds Twilio Authy and IE Flaws to Exploited Vulnerabilities List
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two security flaws to its Known Exploited Vulnerabilities...
BreachForums v1 database leak is an OPSEC test for hackers
The entire database for the notorious BreachForums v1 hacking forum was released on Telegram Tuesday night, exposing a...
Why tech bros are turning to Trump
The Republican presidential candidate is forging new alliances as his campaign gains momentum. Source:: BBC News – Technology
Chinese hackers deploy new Macma macOS backdoor version
The Chinese hacking group tracked as ‘Evasive Panda’ was spotted using new versions of the Macma backdoor and...
Hamster Kombat’s 250 million players targeted in malware attacks
Threat actors are taking advantage of the massive popularity of the Hamster Kombat game, targeting players with fake...
FCC post-mortem on AT&T outage uncovers similar QA issues to those that plagued CrowdStrike
A February AT&T network outage that lasted 12 hours and affected all of its mobile network users was...
Windows 10 KB5040525 fixes WDAC issues causing app failures, memory leak
Microsoft has released the July 2024 preview update for Windows 10, version 22H2, with fixes for Windows Defender...
AWS Cost Categories now supports “Billing Entity” dimension
AWS Cost Categories has added a new dimension “Billing Entity” to its rules. You can now use eight...
DeFi exchange dYdX v3 website hacked in DNS hijack attack
Decentralized finance (DeFi) crypto exchange dYdX announced on Tuesday that the website for its older v3 trading platform...
Phish-Friendly Domain Registry “.top” Put on Notice
The Chinese company in charge of handing out domain names ending in “.top” has been given until mid-August...
Tech Life: Turning the racetrack electric
We’re at the Formula E season finale, exploring how the tech has advanced over 10 years. Source:: BBC...
Issue #639 (July 23, 2024)
#639 – JULY 23, 2024 Asyncio gather() Handle Exceptions The asyncio.gather() function takes an optional argument return_exceptions which...
BreachForums v1 hacking forum data leak exposes members’ info
The private member information of the BreachForums v1 hacking forum from 2022 has been leaked online, allowing threat actors...
FrostyGoop malware attack cut off heat in Ukraine during winter
Russian-linked malware was used in a January 2024 cyberattack to cut off the heating of over 600 apartment...
Meta Llama 3.1 generative AI models now available in Amazon SageMaker JumpStart
The most advanced and capable Meta Llama models to date, Llama 3.1, are now available in Amazon SageMaker...
Amazon EKS introduces new controls for Kubernetes version support policy
Today, Amazon EKS announces new controls for Kubernetes version policy, allowing cluster administrators to configure end of standard...
Amazon ECS now supports Amazon Linux 2023 and more for on-premises container workloads
Amazon Elastic Container Service (Amazon ECS) now supports managing on-premises workloads running on Amazon Linux 2023, Fedora 40,...
AWS AppConfig announces feature flag targets, variants, and splits
Today, AWS announces advanced targeting capabilities for AWS AppConfig feature flags. Customers can set up multiple values within...
Meta Llama 3.1 generative AI models now available in Amazon Bedrock
The most advanced Meta Llama models to date, Llama 3.1, are now available in Amazon Bedrock. Amazon Bedrock...