How Hackers Phish for Your Users’ Credentials and Sell Them
Account credentials, a popular initial access vector, have become a valuable commodity in cybercrime. As a result, a...
Key Cybercriminals Behind Notorious Ransomware Families Arrested in Ukraine
A coordinated law enforcement operation has led to the arrest of key individuals in Ukraine who are alleged...
Stop Identity Attacks: Discover the Key to Early Threat Detection
Identity and Access Management (IAM) systems are a staple to ensure only authorized individuals or entities have access...
Hackers Can Exploit ‘Forced Authentication’ to Steal Windows NTLM Tokens
Cybersecurity researchers have discovered a case of “forced authentication” that could be exploited to leak a Windows user’s...
Announcing IASME as our second Delivery Partner for Cyber Incident Response Level 2
Both CIR Delivery Partners are now accepting enquiries and applications. Source:: NCSC Guidance
New cloud guidance: how to ‘lift and shift’ successfully
Henry O discusses the pitfalls of performing a basic ‘lift and shift’ cloud migration. Source:: NCSC Guidance
AWS Support launches AWS Countdown with a premium tier
Today, Amazon Web Services, Inc. (AWS) announces the general availability of AWS Countdown, a service that enables successful...
Announcing custom blueprints for Amazon CodeCatalyst
Today, AWS announces support for custom blueprints in Amazon CodeCatalyst, giving teams the ability to define best practices...
Amazon Redshift announces new fine-grained access control capabilities to nested objects (preview)
Amazon Redshift data lake analytics supports querying nested data in Parquet, ORC, JSON, and Ion file formats. You...
AWS Application Composer announces AWS Step Functions Workflow Studio integration
AWS Application Composer now integrates AWS Step Functions Workflow Studio, making it easier for developers to visually design...
Amazon Braket launches Braket Direct, a program to dive deeper into quantum computing
Amazon Braket launches Braket Direct, a new program expanding how you can explore quantum computing on AWS, accelerating...
Amazon Redshift announces Multidimensional Data Layouts to optimize your query performance (preview)
Amazon Redshift announces Multidimensional Data Layouts, a new powerful table sorting mechanism that improves performance of repetitive queries....
AWS Glue Data Catalog supports multi engine views with AWS Analytics Engines
AWS Glue Data Catalog now supports the creation, management, and access control of SQL views that support multiple...
Amazon Redshift adds support for incremental refresh for materialized views on data lake tables (preview)
Amazon Redshift now supports incremental refresh for materialized views on Apache Iceberg and standard AWS Glue tables, eliminating...
Introducing the Amazon CodeCatalyst Enterprise Tier
Today, AWS announces the Amazon CodeCatalyst Enterprise Tier, a new pricing tier with enhanced features such as custom...
Mountpoint for Amazon S3 CSI driver is now generally available
With the new Mountpoint for Amazon S3 Container Storage Interface (CSI) driver, your Kubernetes applications can access S3...
AWS SDK for Rust is now generally available
Today, AWS announces the general availability of the AWS SDK for Rust, allowing customers to now use this...
AWS SDK for Kotlin is now generally available
Today, AWS announces the general availability of the AWS SDK for Kotlin, allowing customers to use this for...
Introducing Amazon One Enterprise (Preview)
Today we announce Amazon One Enterprise, a palm-based identity service for enterprise access control. The service enables organizations...
N. Korean Hackers ‘Mixing’ macOS Malware Tactics to Evade Detection
The North Korean threat actors behind macOS malware strains such as RustBucket and KANDYKORN have been observed “mixing...