Can we really ‘reset the internet’ to make it safer for children?
Ofcom has taken a major step in setting out plans to protect children online, but hurdles remain. Source::...
The Fundamentals of Cloud Security Stress Testing
״Defenders think in lists, attackers think in graphs,” said John Lambert from Microsoft, distilling the fundamental difference in...
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
A newer version of a malware loader called Hijack Loader has been observed incorporating an updated set of anti-analysis techniques to fly...
State of ransomware in 2024
Ransomware attacks continue to be one of the biggest contemporary cybersecurity threats, affecting organizations and individuals alike on...
E-gates back online after delays at UK airports
Long queues built up at airports affected by a Border Force “technical issue” at passport control. Source:: BBC...
“What’s happened to my data?”
Irrespective of whether the ransom is paid, a ransomware attack means organisations have lost control of their information....
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
A high-severity flaw impacting the LiteSpeed Cache plugin for WordPress is being actively exploited by threat actors to create rogue admin...
Guidance for organisations considering payment in ransomware incidents
Advice for organisations experiencing a ransomware attack and the partner organisations supporting them. Source:: NCSC Guidance
‘We owe our children’: Grieving parents say social media costs lives
Bereaved families whose children’s deaths were linked to social media are sharing their stories with the BBC. Source::...
US revokes licences for sales of chips to Huawei
The US confirmed it revoked licences allowing the export of some goods to Chinese tech giant. Source:: BBC...
FTX says it has billions more than owed to victims
The failed cryptocurrency giant says it has billions of dollars more than needed to cover its debts. Source::...
Tame toxic algorithms to protect children, big tech told
Big tech companies will have to make changes to their algorithms to comply with new online safety laws....
Announcing a larger instance bundle for Amazon Lightsail
Amazon Lightsail now offers a larger instance bundle with 16 vCPUs and 64 GB memory. The new instance...
AWS Budgets now supports resource and tag-based access controls
AWS Budgets now supports resource and tag-based access controls for easy management and access. You can now add...
Amazon RDS for SQL Server Supports Minor Versions 2019 CU26 and 2022 CU12 GDR
Two new minor versions of Microsoft SQL Server are now available on Amazon RDS for SQL Server, providing...
Amazon MemoryDB now supports condition keys for user authentication and encryption in transit
Today, Amazon MemoryDB launched two new condition keys for IAM policies that enable you to control user authentication...
Tech Life: The mammoth ivory problem
Tech can play a role in combating the illegal trade in elephant ivory. Source:: BBC News – Technology
Issue #628 (May 7, 2024)
#628 – MAY 7, 2024 TypeIs Does What I Thought TypeGuard Would Do in Python In this post,...
AWS Cost Anomaly Detection reduces anomaly detection latency by up to 30%
Starting today, AWS Cost Anomaly Detection will detect cost anomalies up to 30% faster. Customers can now identify...
Amazon Titan Text Premier is now available in Amazon Bedrock
Amazon Titan Text Premier, the latest addition to the Amazon Titan family of large language models (LLMs), is...