Chinese Hackers Use GHOSTSPIDER Malware to Hack Telecoms Across 12+ Countries
The China-linked threat actor known as Earth Estries has been observed using a previously undocumented backdoor called GHOSTSPIDER...
Analysis of Elpaco: a Mimic variant
Introduction In a recent incident response case, we dealt with a variant of the Mimic ransomware with some...
Firefox and Windows zero-days exploited by Russian RomCom hackers
Russian-based RomCom cybercrime group chained two zero-day vulnerabilities in recent attacks targeting Firefox and Tor Browser users across...
CISA Urges Agencies to Patch Critical “Array Networks” Flaw Amid Active Attacks
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a now-patched critical security flaw impacting Array...
AWS Cloud WAN simplifies on-premises connectivity via AWS Direct Connect
AWS Cloud WAN now supports native integration with AWS Direct Connect, simplifying connectivity between your on-premises networks and...
QNAP addresses critical flaws across NAS, router software
QNAP has released security bulletins over the weekend, which address multiple vulnerabilities, including three critical severity flaws that...
New Windows 10 0x80073CFA fix requires installing WinAppSDK 3 times
Microsoft has shared a new method to fix a bug preventing app uninstalls or updates on Windows 10...
Amazon S3 now supports enforcement of conditional write operations for S3 general purpose buckets
Amazon S3 now supports enforcement of conditional write operations for S3 general purpose buckets using bucket policies. With...
Amazon S3 adds new functionality for conditional writes
Amazon S3 can now perform conditional writes that evaluate if an object is unmodified before updating it. This...
Announcing Idle Disconnect Timeout for Amazon WorkSpaces
Amazon WorkSpaces now supports Idle Disconnect Timeout for Windows WorkSpaces Personal with the Amazon DCV protocol. WorkSpaces administrators...
Blue Yonder ransomware attack disrupts grocery store supply chain
Supply chain management firm Blue Yonder is warning that a ransomware attack caused significant disruption to its services,...
Amazon EFS now supports up to 2.5 million IOPS per file system
Amazon EFS now supports up to 2.5 million read IOPS and up to 500,000 write IOPS per file...
AWS delivers enhanced root cause insights to help explain cost anomalies
Today, AWS announces new enhanced root cause analysis capabilities for AWS Cost Anomaly Detection, empowering you to better...
Self-Service Know Your Customer (KYC) for AWS Marketplace Sellers
AWS Marketplace now offers a self-service Know Your Customer (KYC) feature for all sellers wishing to transact via...
DOJ: Man hacked networks to pitch cybersecurity services
A Kansas City man has been indicted for allegedly hacking into computer networks and using this access to promote...
Amazon DataZone now enhances data access governance with enforced metadata rules
Amazon DataZone now supports enforced metadata rules for data access workflows, providing organizations with enhanced capabilities to strengthen...
Amazon S3 Express One Zone now supports conditional deletes
Amazon S3 Express One Zone, a high-performance S3 storage class for latency-sensitive applications, can now evaluate whether an...
Amazon Connect now allows agents to self-assign tasks
Amazon Connect now allows agents to create and assign a task to themselves by checking a box from...
Enhanced Pricing Calculator now supports discounts and purchase commitments (in preview)
Today, AWS announces the public preview of the enhanced AWS Pricing Calculator that provides accurate cost estimates for...
Amazon CloudWatch adds context to observability data in service consoles, accelerating analysis
Amazon CloudWatch now adds context to observability data, making it much easier for IT operators, application developers, and...