Beware: Malicious Google Ads Trick WinSCP Users into Installing Malware
Threat actors are leveraging manipulated search results and bogus Google ads that trick users who are looking to...
Data roaming charges: How to keep costs down when travelling abroad
After MSP Michael Matheson racked up £11,000 on data roaming charges, here’s how to keep your spending low....
FCC Enforces Stronger Rules to Protect Customers Against SIM Swapping Attacks
The U.S. Federal Communications Commission (FCC) is adopting new rules that aim to protect consumers from cell phone...
NIST Publishes SP 800-140Br1 on CMVP Security Policy Requirements
The final version of NIST Special Publication (SP) 800-140Br1 (Revision 1), CMVP Security Policy Requirements: CMVP Validation Authority...
Just Released! Risk Management in the Enterprise: NIST SP 800-221 & NIST SP 800-221A
Information and Communications Technology (ICT) spans all tools, devices, data, infrastructure, and components and it’s a broad concept...
Microsoft welcomes Biden’s new AI order — is that a good thing or bad?
President Joseph R. Biden Jr. last month laid down a wide-ranging executive order targeting generative AI, dealing with...
Applied Materials faces probe in the US for shipping chip equipment to China
Applied Materials, the largest US maker of chipmaking machinery, is facing investigations in the US for violating export...
Discover 2023’s Cloud Security Strategies in Our Upcoming Webinar – Secure Your Spot
In 2023, the cloud isn’t just a technology—it’s a battleground. Zenbleed, Kubernetes attacks, and sophisticated APTs are just...
27 Malicious PyPI Packages with Thousands of Downloads Found Targeting IT Experts
An unknown threat actor has been observed publishing typosquat packages to the Python Package Index (PyPI) repository for...
U.S. Cybersecurity Agencies Warn of Scattered Spider’s Gen Z Cybercrime Ecosystem
U.S. cybersecurity and intelligence agencies have released a joint advisory about a cybercriminal group known as Scattered Spider that’s known...
AI chief quits over ‘exploitative’ copyright row
Former Stability AI executive says it’s not acceptable to use other people’s work without permission. Source:: BBC News...
CISA Adds Three Security Flaws with Active Exploitation to KEV Catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added three security flaws to its Known Exploited...
IBM suspends ads on X after they appeared next to Nazi posts
The decision came a day after owner Elon Musk endorsed an apparent antisemitic conspiracy theory. Source:: BBC News...
Shop owners hope that tech can deter thieves
Retailers are investing in high-tech and low-tech measures to tackle an increase in theft. Source:: BBC News –...
An RFC on IoCs – playing our part in international standards
The NCSC has published a new RFC on Indicators of Compromise to support cyber security in protocol design...
VPCs and subnets now support more sizes for IPv6 CIDRs
Amazon VPC allows customers to create VPCs and subnets of different sizes using IPv6 CIDRs. With this capability,...
Amazon EC2 C7gn instances are now available in AWS Asia Pacific (Tokyo) region
Starting today, AWS Graviton3E-based Amazon Elastic Compute Cloud (Amazon EC2) C7gn instances are available in AWS Asia Pacific...
Amazon SQS announces support for logging data events in AWS CloudTrail
Today, Amazon Simple Queue Service (SQS) announces support for logging data event SQS APIs using AWS CloudTrail, enabling...
New Amazon CloudWatch metric monitors EBS volume I/O health
Today, Amazon announced the availability of a new CloudWatch metric called EBS Stalled I/O Check to monitor the...
AWS Cost Explorer now provides more historical and granular data
Starting today, we are extending the history and improving the granularity of data available in AWS Cost Explorer....