CERT-UA Uncovers New Malware Wave Distributing OCEANMAP, MASEPIE, STEELHOOK
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new phishing campaign orchestrated by the Russia-linked APT28 group to...
Kimsuky Hackers Deploying AppleSeed, Meterpreter, and TinyNuke in Latest Attacks
Nation-state actors affiliated to North Korea have been observed using spear-phishing attacks to deliver an assortment of backdoors...
Microsoft Disables MSIX App Installer Protocol Widely Used in Malware Attacks
Microsoft on Thursday said it’s once again disabling the ms-appinstaller protocol handler by default following its abuse by multiple threat...
Google settles $5bn lawsuit for ‘private mode’ tracking
Large technology firms have faced increased scrutiny of their practices in the US and beyond. Source:: BBC News...
Amazon EKS now supports assigning EC2 security groups to IPv6 Kubernetes pods
Amazon Elastic Kubernetes Service (EKS) customers can now leverage EC2 security groups to secure applications in clusters using...
AWS Support launches Security Improvement Program for Enterprise On-Ramp customers
Today, AWS announces the general availability of the Security Improvement Program (SIP) for Enterprise On-Ramp (EOP) customers. SIP...
Amazon EKS now surfaces cluster health status details
Amazon Elastic Kubernetes Service (EKS) now surfaces cluster-related health issues in the EKS console and API, providing administrators...
CodePipeline supports GitLab self-managed
You can now use projects from your GitLab self-managed instance (GitLab Enterprise Edition, GitLab Community Edition) to build,...
AWS Elemental MediaPackage now available in Asia Pacific (Melbourne) region
AWS Elemental MediaPackage is now available in the Asia Pacific (Melbourne) region. You may now configure and operate...
Google Cloud Resolves Privilege Escalation Flaw Impacting Kubernetes Service
Google Cloud has addressed a medium-severity security flaw in its platform that could be abused by an attacker...
Most Sophisticated iPhone Hack Ever Exploited Apple’s Hidden Hardware Feature
The Operation Triangulation spyware attacks targeting Apple iOS devices leveraged never-before-seen exploits that made it possible to even bypass pivotal...
13 tech luminaries we lost in 2023
The biggest innovations are sometimes borne from seemingly small advancements. Developments such as finding ways to compress computer...
New Rugmi Malware Loader Surges with Hundreds of Daily Detections
A new malware loader is being used by threat actors to deliver a wide range of information stealers such as...
AWS Elemental MediaTailor now supports time shifting in Channel Assembly
With AWS Elemental Mediatailor, you can now begin playback of a Standard Channel Assembly channel outside of the...
Expert: AI ‘hurts ability to keep democracy alive’
Gina Neff told the BBC that AI is damaging media organisation’s ability to generate profits. Source:: BBC News...
Amazon SageMaker provides model training container access for debugging purposes
We are excited to announce the launch of a new easy and secure way to remotely connect to...
Amazon Connect launches new API to update contact priority
Amazon Connect now provides an API to programmatically update the priority of contacts (e.g., voice calls, callbacks, chats,...
Critical Zero-Day in Apache OfBiz ERP System Exposes Businesses to Attack
A new zero-day security flaw has been discovered in the Apache OfBiz, an open-source Enterprise Resource Planning (ERP)...
New York Times sues Microsoft and OpenAI for ‘billions’
The US news organisation claims millions of its articles were used without permission to train ChatGPT. Source:: BBC...
Operation Triangulation: The last (hardware) mystery
Today, on December 27, 2023, we (Boris Larin, Leonid Bezvershenko, and Georgy Kucherin) delivered a presentation, titled, “Operation...