Spotify abused to promote pirated software and game cheats
Spotify playlists and podcasts are being abused to push pirated software, game cheat codes, spam links, and “warez”...
Scammer Black Friday offers: Online shopping threats and dark web
Intro The e-commerce market continues to grow every year. According to FTI consulting, in Q1 2024, online retail...
New ‘Helldown’ Ransomware Variant Expands Attacks to VMware and Linux Systems
Cybersecurity researchers have shed light on a Linux variant of a relatively new ransomware strain called Helldown, suggesting...
Chinese Hackers Exploit T-Mobile and Other U.S. Telecoms in Broader Espionage Campaign
U.S. telecoms giant T-Mobile has confirmed that it was also among the companies that were targeted by Chinese...
CISA Alert: Active Exploitation of VMware vCenter and Kemp LoadMaster Flaws
Now-patched security flaws impacting Progress Kemp LoadMaster and VMware vCenter Server have come under active exploitation in the...
Chocolate makers stoke boom for Indian cocoa beans
India produces only a tiny fraction of the world’s cocoa beans, but that could be changing. Source:: BBC...
Brave on iOS adds new “Shred” button to wipe site-specific data
Brave Browser 1.71 for iOS introduces a new privacy-focused feature called “Shred,” which allows users to easily delete...
Amazon EC2 X2iezn instances are now available in additional AWS region
Starting today, memory optimized Amazon EC2 X2iezn instances are available in Middle East (UAE). Amazon EC2 X2iezn instances...
AWS IoT SiteWise announces new generative AI-powered industrial assistant
AWS IoT SiteWise is a managed service that simplifies the collection, organization, and monitoring of industrial equipment data...
Amazon EKS simplifies providing IAM permissions to EKS add-ons
Amazon Elastic Kubernetes Service (EKS) now offers a direct integration between EKS add-ons and EKS Pod Identity, streamlining...
Amazon Aurora MySQL 3.08 (compatible with MySQL 8.0.39) is generally available
Starting today, Amazon Aurora MySQL-Compatible Edition 3 (with MySQL 8.0 compatibility) will support MySQL 8.0.39. In addition to...
Chinese hackers exploit Fortinet VPN zero-day to steal credentials
Chinese threat actors use a custom post-exploitation toolkit named ‘DeepData’ to exploit a zero-day vulnerability in Fortinet’s FortiClient Windows...
AWS Chatbot adds support for chatting about AWS resources with Amazon Q Developer in Microsoft Teams and Slack
We are excited to announce the general availability of Amazon Q Developer in AWS Chatbot, which provides answers...
US space tech giant Maxar discloses employee data breach
Hackers breached U.S. satellite maker Maxar Space Systems and accessed personal data belonging to its employees, the company...
Amazon DynamoDB announces general availability of attribute-based access control
Amazon DynamoDB is a serverless, NoSQL, fully managed database with single-digit millisecond performance at any scale. Today, we...
Palo Alto Networks patches two firewall zero-days used in attacks
Palo Alto Networks has finally released security updates for an actively exploited zero-day vulnerability in its Next-Generation Firewalls (NGFW). […]...
AWS Controllers for Kubernetes for AWS Private CA now generally available
AWS Controllers for Kubernetes (ACK) service controller for AWS Private Certificate Authority (AWS Private CA) has graduated to...
Nvidia Blackwell chips face serious heating issues
Nvidia’s next-generation Blackwell data center processors have significant problems with overheating when installed in high-capacity server racks, forcing...
US charges Phobos ransomware admin after South Korea extradition
Evgenii Ptitsyn, a Russian national and suspected administrator of the Phobos ransomware operation, was extradited from South Korea...
Announcing business planning feature in AWS Partner Central
AWS Partner Central is launching a business planning feature to help AWS Partners create successful partnerships and accelerate...