Chinese and N. Korean Hackers Target Global Infrastructure with Ransomware
Threat actors with suspected ties to China and North Korea have been linked to ransomware and data encryption...
Practical Guidance For Securing Your Software Supply Chain
The heightened regulatory and legal pressure on software-producing organizations to secure their supply chains and ensure the integrity...
Apple Patches AirPods Bluetooth Vulnerability That Could Allow Eavesdropping
Apple has released a firmware update for AirPods that could allow a malicious actor to gain access to...
Optical networking challenges gain attention as AI networking demands rise
As large enterprise and hyperscaler networks process increasingly greater AI workloads and other applications that require high-bandwidth performance,...
New Credit Card Skimmer Targets WordPress, Magento, and OpenCart Sites
Multiple content management system (CMS) platforms like WordPress, Magento, and OpenCart have been targeted by a new credit...
New Medusa Android Trojan Targets Banking Users Across 7 Countries
Cybersecurity researchers have discovered an updated version of an Android banking trojan called Medusa that has been used...
Over 110,000 Websites Affected by Hijacked Polyfill Supply Chain Attack
Google has taken steps to block ads for e-commerce sites that use the Polyfill.io service after a Chinese...
VW to invest up to $5bn in Tesla rival Rivian
Shares in the US-based electric truck and SUV maker jumped by around 50% after the announcement. Source:: BBC...
AI21 Labs’ Jamba-Instruct model now available in Amazon Bedrock
AI21 Labs’ Jamba-Instruct, a powerful instruction-following large language model, is now available in Amazon Bedrock. Fine-tuned for instruction...
Amazon CodeCatalyst now supports GitLab.com source code repositories
Amazon CodeCatalyst now supports the use of source code repositories hosted in GitLab.com in CodeCatalyst projects. This allows...
Tech Life: Detecting cancer using AI
The role machine learning can play in accurate blood tests for bowel cancer. Source:: BBC News – Technology
Issue #635 (June 25, 2024)
#635 – JUNE 25, 2024 PEP 2026: Calendar Versioning for Python This PEP proposes updating the versioning scheme...
Plugins on WordPress.org backdoored in supply chain attack
A threat actor modified the source code of at least five plugins hosted on WordPress.org to include malicious PHP...
Polyfill.io JavaScript supply chain attack impacts over 100K sites
Over 100,000 sites have been impacted in a supply chain attack by the Polyfill.io service after a Chinese company acquired...
Tata Communications partners with Versa Networks on hosted SASE
Tata Communications has entered the fast-growing SASE market with a hosted offering for global enterprises. It said that...
New Medusa malware variants target Android users in seven countries
The Medusa banking trojan for Android has re-emerged after almost a year of keeping a lower profile in...
Amazon MSK supports in-place upgrades from M5, T3 instance types to Graviton3 based M7G
You can now upgrade your Amazon Managed Streaming for Apache Kafka (Amazon MSK) provisioned clusters running on X-86...
Amazon Time Sync Service expands microsecond-accurate time to 27 EC2 instance types
The Amazon Time Sync Service now supports clock synchronization within microseconds of UTC on 27 additional Amazon Elastic...
Amazon RDS for MySQL announces Extended Support minor 5.7.44-RDS.20240529
Amazon Relational Database Service (RDS) for MySQL announces Amazon RDS Extended Support minor version 5.7.44-RDS.20240529. We recommend that...
AWS CodeBuild supports Arm-based workloads using AWS Graviton3
AWS CodeBuild’s support for Arm-based workloads now run on AWS Graviton3 without any additional configuration. In February 2021,...