Tool Overload: Why MSPs Are Still Drowning with Countless Cybersecurity Tools in 2024
Highlights Complex Tool Landscape: Explore the wide array of cybersecurity tools used by MSPs, highlighting the common challenge...
Chinese Cyber Espionage Targets Telecom Operators in Asia Since 2021
Cyber espionage groups associated with China have been linked to a long-running campaign that has infiltrated several telecom...
Booking.com warns of up to 900% increase in travel scams
The online travel firm says generative AI tools, such as ChatGPT, are driving the explosive rise. Source:: BBC...
New Rust-based Fickle Malware Uses PowerShell for UAC Bypass and Data Exfiltration
A new Rust-based information stealer malware called Fickle Stealer has been observed being delivered via multiple attack chains...
Experts Uncover New Evasive SquidLoader Malware Targeting Chinese Organizations
Cybersecurity researchers have uncovered a new evasive malware loader named SquidLoader that spreads via phishing campaigns targeting Chinese...
How AWS secures its infrastructure with Sonaris
AWS is using its public cloud infrastructure as a globe-spanning threat detection tool to protect customers from trillions...
HPE-Juniper merger faces antitrust inquiry in UK
An inquiry into HPE’s $14 billion takeover of Juniper Networks by the UK’s Competition and Markets Authority (CMA),...
T-Mobile denies it was hacked, links leaked data to vendor breach
T-Mobile has denied it was breached or that source code was stolen after a threat actor claimed to...
Crown Equipment confirms a cyberattack disrupted manufacturing
Forklift manufacturer Crown Equipment confirmed today that it suffered a cyberattack earlier this month that disrupted manufacturing at...
Advance Auto Parts confirms data breach exposed employee information
Advance Auto Parts has confirmed it suffered a data breach after a threat actor attempted to sell stolen...
Amazon OpenSearch Service now supports JSON Web Token (JWT) authentication and authorization
Amazon OpenSearch Service now supports JSON Web Token (JWT) that enables you to authenticate and authorize users without...
CDK Global cyberattack impacts thousands of US car dealerships
Car dealership software-as-a-service provider CDK Global was hit by a massive cyberattack, causing the company to shut down...
Amazon CodeCatalyst now supports GitHub Cloud and Bitbucket Cloud with Amazon Q
Amazon CodeCatalyst now supports the use of source code repositories hosted in GitHub Cloud and Bitbucket Cloud with...
Announcing support for Autodesk 3ds Max Usage-Based Licensing in AWS Deadline Cloud
The AWS Deadline Cloud Usage-Based Licensing (UBL) server now offers on-demand licenses for Autodesk 3ds Max, a popular...
AWS Elemental MediaConnect adds source stream monitoring
AWS Elemental MediaConnect now provides information about the incoming transport stream and its program media. You can view...
Amazon SageMaker now offers a fully managed MLflow Capability
Amazon SageMaker now offers a fully managed MLflow capability. Data scientists can use familiar MLflow constructs to organize,...
AWS Glue adds additional 13 new transforms including flag duplicates
AWS Glue now offers 13 new built-in transforms: Flag duplicates in column, Format Phone Number, Format case, Fill...
Kraken Crypto Exchange Hit by $3 Million Theft Exploiting Zero-Day Flaw
Crypto exchange Kraken revealed that an unnamed security researcher exploited an “extremely critical” zero-day flaw in its platform...
HPE and Nvidia unveil private cloud for AI
Hewlett Packard Enterprise has introduced a portfolio of AI products and services jointly developed with Nvidia that it...
Chinese Cyber Espionage Group Exploits Fortinet, Ivanti and VMware Zero-Days
The China-nexus cyber espionage actor linked to the zero-day exploitation of security flaws in Fortinet, Ivanti, and VMware...