QuickSight now supports subfolders in restricted folders to enable governed data sharing
Amazon QuickSight now supports subfolders in restricted folders for asset organization and permissions management. QuickSight assets created in...
AWS Lambda console now surfaces key function insights via built-in Amazon CloudWatch Metrics Insights dashboard
The AWS Lambda console now surfaces key metrics about Lambda functions in your AWS account via a built-in...
AWS Lambda console now supports real-time log analytics via Amazon CloudWatch Logs Live Tail
The AWS Lambda console now supports Amazon CloudWatch Logs Live Tail, an interactive log streaming and analytics capability...
Ubuntu Pro for EC2 Spot Instances
Starting today, you can launch Amazon EC2 Spot Instances using Ubuntu Pro based Amazon Machine Images (AMIs). You...
Meta fires staff for buying toothpaste, not lunch
Meta workers reportedly used vouchers that should have been spent on meals to buy household goods. Source:: BBC...
Russian RomCom Attacks Target Ukrainian Government with New SingleCamper RAT Variant
The Russian threat actor known as RomCom has been linked to a new wave of cyber attacks aimed...
Scary cybersecurity stories to tell in the dark
Welcome, humans and ghouls! It’s your old pal, the Vault Keeper, sneaking into the Avast Security News Team’s...
BianLian ransomware claims attack on Boston Children’s Health Physicians
The BianLian ransomware group has claimed the cyberattack on Boston Children’s Health Physicians (BCHP) and threatens to leak...
Global cybersecurity talent gap widens
Despite some recent positive news for tech hiring, a growing cybersecurity talent shortage threatens to hamstring businesses. Data...
Hackers blackmail Globe Life after stealing customer data
Insurance giant Globe Life says an unknown threat actor attempted to extort money in exchange for not publishing...
Sudanese Brothers Arrested in ‘AnonSudan’ Takedown
The U.S. government on Wednesday announced the arrest and charging of two Sudanese brothers accused of running Anonymous...
Top 5 Cloud Security Automations for SecOps Teams
Learn about 5 powerful cloud security automations with Blink Ops to simplify security operations like S3 bucket monitoring,...
Researchers Uncover Cicada3301 Ransomware Operations and Its Affiliate Program
Cybersecurity researchers have gleaned additional insights into a nascent ransomware-as-a-service (RaaS) called Cicada3301 after successfully gaining access to...
The story of web framework Hono, from the creator of Hono
Hono is a fast, lightweight web framework that runs anywhere JavaScript does, built with Web Standards. Of course,...
Instagram adds features to help stop sextortion
Law enforcement agencies have reported a rise in sextortion scams targeting teens across online platforms. Source:: BBC News...
Data center provider fakes Tier 4 data center certificate to bag $11M SEC deal
Deepak Jain, CEO of a Maryland-based IT services firm, has been indicted for fraud and making false statements...
SideWinder APT Strikes Middle East and Africa With Stealthy Multi-Stage Attack
An advanced persistent threat (APT) actor with suspected ties to India has sprung forth with a flurry of...
SAS CTF and the many ways to persist a kernel shellcode on Windows 7
On May 18, 2024, Kaspersky’s Global Research & Analysis Team (GReAT), with the help of its partners, held...
U.S. Charges Two Sudanese Brothers for Record 35,000 DDoS Attacks
Federal prosecutors in the U.S. have charged two Sudanese brothers with running a distributed denial-of-service (DDoS) botnet for...
Critical Kubernetes Image Builder Vulnerability Exposes Nodes to Root Access Risk
A critical security flaw has been disclosed in the Kubernetes Image Builder that, if successfully exploited, could be...