Amazon Bedrock now available in the Asia Pacific (Mumbai) Region
Beginning today, customers can use Amazon Bedrock in the Asia Pacific (Mumbai) region to easily build and scale...
AWS Trusted Advisor now supports API to exclude resources
AWS Trusted Advisor introduces new API to enable you to programmatically exclude resources from recommendations associated with Trusted...
Introducing file commit history in Amazon CodeCatalyst
Today, AWS announces the general availability of file commit history in Amazon CodeCatalyst. Customers can now view the...
Amazon Personalize launches new recipes supporting larger item catalogs with lower latency
Today, Amazon Personalize announces the general availability of two new recipes, User-Personalization-v2 and Personalized-Ranking-v2 (v2 recipes). Built on...
Amazon Connect Contact Lens now provides generative AI-powered agent performance evaluations (preview)
Amazon Connect Contact Lens now provides managers with generative AI-powered recommendations for answers to questions in agent evaluation...
Amazon Chime SDK Voice Connector now supports audio streaming G.711 A-Law encoded audio
Amazon Chime SDK Voice Connector audio streaming now supports G.711 A-law encoded audio. With this update, companies can...
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Several popular Android applications available in Google Play Store are susceptible to a path traversal-affiliated vulnerability that could be exploited...
Knowledge Bases for Amazon Bedrock now supports MongoDB Atlas for vector storage
Knowledge Bases for Amazon Bedrock securely connects foundation models (FMs) to internal company data sources for Retrieval Augmented...
Ukrainian REvil Hacker Sentenced to 13 Years and Ordered to Pay $16 Million
A Ukrainian national has been sentenced to more than 13 years in prison and ordered to pay $16...
When is One Vulnerability Scanner Not Enough?
Like antivirus software, vulnerability scans rely on a database of known weaknesses. That’s why websites like VirusTotal exist,...
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
Cloud storage services provider Dropbox on Wednesday disclosed that Dropbox Sign (formerly HelloSign) was breached by unidentified threat actors, who accessed...
New “Goldoon” Botnet Targets D-Link Routers With Decade-Old Flaw
A never-before-seen botnet called Goldoon has been observed targeting D-Link routers with a nearly decade-old critical security flaw with the goal of using the...
TikTok and Universal settle music royalties dispute
The deal means songs from artists including Ariana Grande and Drake can be used on the platform again....
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical flaw impacting GitLab to its Known Exploited Vulnerabilities...
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
A new malware called Cuttlefish is targeting small office and home office (SOHO) routers with the goal of stealthily monitoring all traffic through the...
Uber faces £250m London black cab drivers lawsuit
The case against the US-based ride-hailing giant is being brought on behalf of over 10,800 drivers. Source:: BBC...
The insect farmers turning to AI to help lower costs
Makers of insect-based animal feed hope to be able to compete with soybeans on price. Source:: BBC News...
Amazon EC2 simplifies visibility into your active AMIs
Starting today, you can check when your Amazon Machine Images (AMIs) were last used to launch EC2 instances...
Amazon EC2 now protects your AMIs from accidental deregistration
Starting today, you can prevent Amazon Machine Images (AMIs) from accidental deregistration by marking them as protected. A...
Amazon Pinpoint now supports multimedia messaging service (MMS)
Today, Amazon Pinpoint announces support for outbound multimedia messaging service (MMS) within the United States and Canada. The...