Amazon Bedrock announces new Converse API
Today, Amazon Bedrock announces the new Converse API, which provides developers a consistent way to invoke Amazon Bedrock...
Introducing versioning for AWS WAF Bot & Fraud Control managed rule groups
AWS WAF now allows you to select specific versions of Bot Control and Fraud Control managed rule groups...
Amazon QuickSight is now available in Milan, Zurich, Cape Town and Jakarta Regions
Amazon QuickSight, which lets you easily create and publish interactive dashboards across your organization and embed data visualizations...
Powertools for AWS Lambda (Python) adds support for Agents for Amazon Bedrock
Powertools for AWS Lambda (Python), an open-source developer library, launched a new feature to ease the creation of...
Amazon Redshift Serverless is now available in Region Europe (Zurich) and Europe (Spain)
Amazon Redshift Serverless, which allows you to run and scale analytics without having to provision and manage data...
Amazon EventBridge Scheduler adds new API request metrics for improved observability
Amazon EventBridge Scheduler now emits 12 new Amazon CloudWatch metrics allowing you to monitor API request rates for...
FlyingYeti Exploits WinRAR Vulnerability to Deliver COOKBOX Malware in Ukraine
Cloudflare on Thursday said it took steps to disrupt a month-long phishing campaign orchestrated by a Russia-aligned threat...
Personalized Learning with Gipi, NVIDIA TensortRT-LLM, and AI Foundation Models
Over 1.2B people are actively learning new languages, with over 500M learners on digital learning platforms such as...
Everbridge warns of corporate systems breach exposing business data
Everbridge, an American software company focused on crisis management and public warning solutions, notified customers that unknown attackers...
Cyber Espionage Alert: LilacSquid Targets IT, Energy, and Pharma Sectors
A previously undocumented cyber espionage-focused threat actor named LilacSquid has been linked to targeted attacks spanning various sectors...
AT&T taps Cisco fixed 5G wireless gateways for WAN service
Cisco Meraki rolled out 5G Fixed Wireless Access (FWA) gateways, and AT&T said it will use them to...
‘Operation Endgame’ Hits Malware Delivery Platforms
Law enforcement agencies in the United States and Europe today announced Operation Endgame, a coordinated action against some...
Cooler Master confirms customer info stolen in data breach
Computer hardware manufacturer Cooler Master has confirmed that it suffered a data breach on May 19, allowing a...
RedTail Crypto-Mining Malware Exploiting Palo Alto Networks Firewall Vulnerability
The threat actors behind the RedTail cryptocurrency mining malware have added a recently disclosed security flaw impacting Palo...
BBC suffers data breach impacting current, former employees
The BBC has disclosed a data security incident that occurred on May 21, involving unauthorized access to files...
Researchers Uncover Active Exploitation of WordPress Plugin Vulnerabilities
Cybersecurity researchers have warned that multiple high-severity security vulnerabilities in WordPress plugins are being actively exploited by threat...
Disrupting FlyingYeti’s campaign targeting Ukraine
Cloudforce One is publishing the results of our investigation and real-time effort to detect, deny, degrade, disrupt, and...
Alibaba Cloud is betting on emerging markets with massive price cuts
Alibaba’s recent move to reduce prices of several cloud services, including compute, storage, and database offerings among others,...
Cloudflare acquires BastionZero to extend Zero Trust access to IT infrastructure
We’re excited to announce that BastionZero, a Zero Trust infrastructure access platform, has joined Cloudflare. This acquisition extends...
A New Way of Designing Auxetic Materials
Auxetics defy common sense, widening when they’re stretched and narrowing when they’re compressed. Source:: NIST