Amazon to pay $30m over Alexa and Ring privacy violations
It will also pay out after allowing employees of its Ring doorbell system access to customer recordings. Source::...
Amazon Route 53 now integrates with Amazon GuardDuty threat intelligence
Starting today, you can enable a new Managed Domain List on Amazon Route 53 Resolver DNS Firewall, to...
AWS Elemental MediaTailor now supports delivery of client-side overlay ads
AWS Elemental MediaTailor now recognizes overlay ad-break signals as valid ad break types in over the top (OTT)...
AWS Snow Family quickens multi-PB data migration with new 210TB device
AWS announces the general availability of a new AWS Snowball Edge Storage Optimized device with higher storage capacity....
Protecting Sensitive Data and AI Models with Confidential Computing
Rapid digital transformation has led to an explosion of sensitive data being generated across the enterprise. That data...
A New Frontier for 5G Network Security
Wireless technology has evolved rapidly and the 5G deployments have made good progress around the world. Up until...
Amazon EventBridge announces open-source connector for Kafka Connect
Today, AWS announces the Amazon EventBridge open-source connector for Apache Kafka Connect. This connector allows you to integrate...
Intel looking likely to manufacture Nvidia chips
More than a year ago, Nvidia CEO Jensen Huang said he was open to the possibility of having...
Decentralizing AI with a Liquid-Cooled Development Platform by Supermicro and NVIDIA
AI is the topic of conversation around the world in 2023. It is rapidly being adopted by all...
Cybercriminals Targeting Apache NiFi Instances for Cryptocurrency Mining
A financially motivated threat actor is actively scouring the internet for unprotected Apache NiFi instances to covertly install a cryptocurrency...
WWDC: Apple gets back to the Mac in PC sales attack
What do you need to go with a new cutting-edge mixed reality product? Computers to create virtual worlds...
Critical Firmware Backdoor in Gigabyte Systems Exposes ~7 Million Devices
Cybersecurity researchers have found “backdoor-like behavior” within Gigabyte systems, which they say enables the UEFI firmware of the devices to...
Beware of Ghost Sites: Silent Threat Lurking in Your Salesforce Communities
Improperly deactivated and abandoned Salesforce Sites and Communities (aka Experience Cloud) could pose severe risks to organizations, leading to unauthorized access to...
NIST 2022 Cybersecurity & Privacy Annual Report
This week, NIST released the newly redesigned and streamlined Special Publication 800-225, Fiscal Year (FY) 2022 Cybersecurity and...
May 31, 2023, Champlain Towers South Investigation Update: Second Warehouse Will Allow New Phase of Testing
On May 11, 2023, the Miami-Dade Police Department (MDPD) and the National Construction Safety Team (NCST) finished moving...
Top 5 at 5×5: Unleashing industry’s power of collaboration and innovation
By: The First Responder Network Authority (FirstNet Authority) and National Institute of Standards and Technology (NIST) Public Safety...
Leveling-Up SEM Measurements for Chip Manufacturing
Researchers from the National Institute of Standards and Technology (NIST) and KLA Corporation, a provider of inspection and...
Microsoft Details Critical Apple macOS Vulnerability Allowing SIP Protection Bypass
Microsoft has shared details of a now-patched flaw in Apple macOS that could be abused by threat actors...
6 Steps to Effective Threat Hunting: Safeguard Critical Assets and Fight Cybercrime
Finding threat actors before they find you is key to beefing up your cyber defenses. How to do...
The metaverse: Not dead yet
The metaverse has been described as the next phase of the internet: interconnected and persistent 3D spaces where...