Amazon QuickSight now supports GetClusterCredentialswithIAM for Redshift Data Sources
Amazon QuickSight now supports connectivity to Redshift data source using an IAM role through GetClusterCredentialswithIAM. This is an...
Supercharge Generative AI Development with Firebase Genkit, Optimized by NVIDIA RTX GPUs
At Google I/O 2024, Google announced Firebase Genkit, a new open-source framework for developers to add generative AI...
Phishing attacks rise 58% in the year of AI
Phishing threats have reached unprecedented levels of sophistication in the past year, driven by the proliferation of generative...
Iranian MOIS-Linked Hackers Behind Destructive Attacks on Albania and Israel
An Iranian threat actor affiliated with the Ministry of Intelligence and Security (MOIS) has been attributed as behind...
Cisco OpenDNS Pulsing DNS Denial of Service Vulnerability
The Cisco OpenDNS service was susceptible to a DNS pulsing attack due to improper handling if a large...
New VPN risk report finds nearly half of enterprises attacked via VPN vulnerabilities
Virtual private networks (VPNs) have long provided remote access for enterprises. However, after a year full of high-profile...
ChatGPT to lose voice over Scarlett Johansson similarity
The flirty, conversational upgrade to OpenAI’s chatbot has been compared by some to 2013 film Her. Source:: BBC...
Foxit PDF Reader Flaw Exploited by Hackers to Deliver Diverse Malware Arsenal
Multiple threat actors are weaponizing a design flaw in Foxit PDF Reader to deliver a variety of malware...
BT scraps digital landline switch deadline
BT has ditched its timetable to move landline customers from copper wire to digital. Source:: BBC News –...
YouTube, the backdrop of a scammer’s play
For once, you get an interesting ad on YouTube. It looks legit, with a well-known spokesperson and everything....
Defending Your Commits From Known CVEs With GitGuardian SCA And Git Hooks
All developers want to create secure and dependable software. They should feel proud to release their code with...
Cyber Criminals Exploit GitHub and FileZilla to Deliver Cocktail Malware
A “multi-faceted campaign” has been observed abusing legitimate services like GitHub and FileZilla to deliver an array of...
Business email compromise: new guidance to protect your organisation
How to disrupt targeted phishing attacks aimed at senior executives or budget holders. Source:: NCSC Guidance
Amazon WorkSpaces Web is now called Amazon WorkSpaces Secure Browser
Today, AWS End User Computing announced Amazon WorkSpaces Web is now called Amazon WorkSpaces Secure Browser. With WorkSpaces...
Latrodectus Malware Loader Emerges as IcedID’s Successor in Phishing Campaigns
Cybersecurity researchers have observed a spike in email phishing campaigns starting early March 2024 that delivers Latrodectus, a nascent...
AWS Control Tower improves control operations at scale
AWS Control Tower customers can now submit up to 100 control operations concurrently. These operations can span multiple...
AWS Resource Explorer now provides filtering on resources that support tags
Today, AWS announces a new filter in AWS Resource Explorer to search for resources that support tags. This...
Chinese Nationals Arrested for Laundering $73 Million in Pig Butchering Crypto Scam
The U.S. Department of Justice (DoJ) has charged two arrested Chinese nationals for allegedly orchestrating a pig butchering...
Grandoreiro Banking Trojan Resurfaces, Targeting Over 1,500 Banks Worldwide
The threat actors behind the Windows-based Grandoreiro banking trojan have returned in a global campaign since March 2024 following a...
Multiple Cisco Unified Communications Products Unauthenticated API High CPU Utilization Denial of Service Vulnerability
A vulnerability in an API endpoint of multiple Cisco Unified Communications Products could allow an unauthenticated, remote attacker...