Amazon EC2 introduces Allowed AMIs to enhance AMI governance
Amazon EC2 introduces Allowed AMIs, a new account-wide setting that enables you to limit the discovery and use...
Amazon CloudWatch and Amazon OpenSearch Service launch an integrated analytics experience
Amazon Web Services announces a new integrated analytics experience and zero-ETL integration between Amazon CloudWatch and Amazon OpenSearch...
Amazon Bedrock now supports Rerank API to improve accuracy of RAG applications
Amazon Bedrock announces support for reranker models through the Rerank API, enabling developers to improve the relevance of...
Amazon Bedrock Knowledge Bases now supports custom connectors and ingestion of streaming data
Amazon Bedrock Knowledge Bases now supports custom connector and ingestion of streaming data, allowing developers to add, update,...
AWS simplifies the use of third-party block storage arrays with AWS Outposts
Starting today, customers can attach block data volumes backed by NetApp® on-premises enterprise storage arrays and Pure Storage®...
AWS announces Invoice Configuration
Today, AWS announces the general availability of Invoice Configuration, which enables you to customize your invoicing experience to...
AWS announces Amazon CloudWatch Database Insights
AWS announces the general availability of Amazon CloudWatch Database Insights with support for Amazon Aurora PostgreSQL and Amazon...
AWS Verified Access now supports secure access to resources over non-HTTP(S) protocols (Preview)
Today, AWS announces the preview of AWS Verified Access’ new feature that supports secure access to resources that...
AWS DMS Schema Conversion now uses generative AI
AWS Database Migration Service (AWS DMS) Schema Conversion with generative AI is now available. The feature is currently...
AWS Control Tower launches managed controls using declarative policies
Today, we are excited to announce the general availability of managed, preventive controls implemented using declarative policies in...
Novel phishing campaign uses corrupted Word documents to evade security
A novel phishing attack abuses Microsoft’s Word file recovery feature by sending corrupted Word documents as email attachments,...
Novel phising campaign uses corrupted Word documents to evade security
A novel phishing attack abuses Microsoft’s Word file recovery feature by sending corrupted Word documents as email attachments,...
SpyLoan Android malware on Google play installed 8 million times
A new set of 15 SpyLoan apps with over 8 million installs was discovered on Google Play, targeting...
Cate Blanchett ‘deeply concerned’ by AI impact
The Australian actress says the threat of AI is “very real” as “you can totally replace anyone”. Source::...
Wanted Russian Cybercriminal Linked to Hive and LockBit Ransomware Has Been Arrested
A Russian cybercriminal wanted in the U.S. in connection with LockBit and Hive ransomware operations has been arrested...
Why so many games are failing right now – and why others are breakout hits
Making games is hard and, in 2024, getting people to buy them is another challenge. Source:: BBC News...
New Rockstar 2FA phishing service targets Microsoft 365 accounts
A new phishing-as-a-service (PhaaS) platform named ‘Rockstar 2FA’ has emerged, facilitating large-scale adversary-in-the-middle (AiTM) attacks to steal Microsoft...
Russia arrests cybercriminal Wazawaka for ties with ransomware gangs
Russian law enforcement has arrested and indicted notorious ransomware affiliate Mikhail Pavlovich Matveev (also known as Wazawaka, Uhodiransomwar,...
Bologna FC confirms data breach after RansomHub ransomware attack
Bologna Football Club 1909 has confirmed it suffered a ransomware attack after its stolen data was leaked online...
New Windows Server 2012 zero-day gets free, unofficial patches
Free unofficial security patches have been released through the 0patch platform to address a zero-day vulnerability introduced over...