AWS Systems Manager now supports syncing inventory data to and from AWS opt-in Regions
Today, AWS Systems Manager Inventory announces support for Inventory Resource Data Sync in AWS opt-in Regions (Region that...
Amazon VPC now supports idempotency for route table and network ACL creation
Amazon VPC now supports idempotent creation of route tables and network ACLs, allowing you to safely retry creation...
Introducing the AWS Small and Medium Business (SMB) Competency
We are excited to launch the AWS Small & Medium Business (SMB) Competency, the first go-to-market AWS Specialization...
Microsoft video games division lays off 1,900 staff
The announcement comes three months after the firm closed its huge merger with Activision-Blizzard. Source:: BBC News –...
That new X cryptocurrency? It’s a scam.
In the dynamic landscape of online scams, our Avast team has identified a new and bold scam, using...
SystemBC Malware’s C2 Server Analysis Exposes Payload Delivery Tricks
Cybersecurity researchers have shed light on the command-and-control (C2) server of a known malware family called SystemBC. “SystemBC can...
How Satya Nadella navigated Microsoft to $3 trillion market value
It is clearly Microsoft’s moment in the sun as its market value crossed the $3 trillion mark for...
Virgin Media most-complained about broadband provider
The company says the latest data from regulator Ofcom “falls far short of our expectations”. Source:: BBC News...
NIST is Requesting Public Input on Published Strategic Plan for Smart Cities Program
The Global Community Technology Challenge (GCTC) is a U.S. smart cities and communities program led by the Smart...
Critical Jenkins Vulnerability Exposes Servers to RCE Attacks – Patch ASAP!
The maintainers of the open-source continuous integration/continuous delivery and deployment (CI/CD) automation software Jenkins have resolved nine security...
LODEINFO Fileless Malware Evolves with Anti-Analysis and Remote Code Tricks
Cybersecurity researchers have uncovered an updated version of a backdoor called LODEINFO that’s distributed via spear-phishing attacks. The findings come...
Cyber Threat Landscape: 7 Key Findings and Upcoming Trends for 2024
The 2023/2024 Axur Threat Landscape Report provides a comprehensive analysis of the latest cyber threats. The information combines...
The rise of synthetic media: Get ready for AI avatars at work
Despite ongoing concerns about the rise of deepfake videos — online content created or manipulated typically for nefarious...
Palworld: Pokémon Company to investigate copying claims
The people behind Pikachu and friends finally comment on the wildly successful “Pokémon with guns”. Source:: BBC News...
China-backed Hackers Hijack Software Updates to Implant “NSPX30” Spyware
A previously undocumented China-aligned threat actor has been linked to a set of adversary-in-the-middle (AitM) attacks that hijack...
Privacy predictions for 2024
In our previous privacy predictions piece, we outlined trends for 2023. As expected, there was a notable increase...
Google settles $1.7 billion lawsuit over AI chips patent infringement
Google has settled a $1.7 billion lawsuit over AI chips patent infringement filed by computer scientist Joseph Bates...
NCSC for Startups: Playing cyber criminals at their own game
CounterCraft’s co-founder, Dan Brett, explains how they turn the tables so that social engineering can be used to...
New CherryLoader Malware Mimics CherryTree to Deploy PrivEsc Exploits
A new Go-based malware loader called CherryLoader has been discovered by threat hunters in the wild to deliver additional payloads...
Tech Giant HP Enterprise Hacked by Russian Hackers Linked to DNC Breach
Hackers with links to the Kremlin are suspected to have infiltrated information technology company Hewlett Packard Enterprise’s (HPE)...