Apple’s iPhone factories are going to get much, much smarter
While it’s not quite robots building robots, we’re getting closer to it as iPhone-maker Foxconn teams up with Nvidia to...
Critical Citrix NetScaler Flaw Exploited to Target from Government, Tech Firms
Citrix is warning of exploitation of a recently disclosed critical security flaw in NetScaler ADC and Gateway appliances...
September 2023 NICE Community Coordinating Council Monthly Meeting Recap
#ICYMI – Monthly Meeting Recap In case you missed last month’s meeting, the minutes from the September 26,...
Newly Launched! The Cybersecurity Career Ambassador Program
Cybersecurity Career Week October 16-21, 2023 nist.gov/nice/ccw The NICE Community Coordinating Council’s Promote Career Discovery Working Group is...
Unraveling Real-Life Attack Paths – Key Lessons Learned
In the ever-evolving landscape of cybersecurity, attackers are always searching for vulnerabilities and exploits within organizational environments. They...
Qubitstrike Targets Jupyter Notebooks with Crypto Mining and Rootkit Campaign
A threat actor, presumably from Tunisia, has been linked to a new campaign targeting exposed Jupyter Notebooks in...
Updated MATA attacks industrial companies in Eastern Europe
In early September 2022, we discovered several new malware samples belonging to the MATA cluster. As we were...
The one thing that might keep Google’s Pixel 8 phones from selling
If you’ll pardon the nod to a certain posterior-possessed 90s-era rap icon, after spending the past couple weeks...
10 new Windows 11 features in the October 2023 update to try now
Windows 11 just got a lot of new features, and 2023’s big update isn’t just about AI taking...
Face search company Clearview AI overturns UK privacy fine
Controversial firm, which acts as a search engine for faces, wins appeal against a watchdog. Source:: BBC News...
TetrisPhantom: Cyber Espionage via Secure USBs Targets APAC Governments
Government entities in the Asia-Pacific (APAC) region are the target of a long-running cyber espionage campaign dubbed TetrisPhantom. “The...
New Admin Takeover Vulnerability Exposed in Synology’s DiskStation Manager
A medium-severity flaw has been discovered in Synology’s DiskStation Manager (DSM) that could be exploited to decipher an...
D-Link Confirms Data Breach: Employee Falls Victim to Phishing Attack
Taiwanese networking equipment manufacturer D-Link has confirmed a data breach that led to the exposure of what it...
MI5 head warns of ‘epic scale’ of Chinese espionage
Tens of thousands of British businesses are warned of the risk of having their innovation stolen. Source:: BBC...
X begins charging new users $1 a year in New Zealand, Philippines
The new trial, beginning in New Zealand and Philippines, is to combat bots and spammers, says X. Source::...
US-China chip war: Washington announces new export curbs
The move makes it tougher for companies like Nvidia, AMD and Intel to sell existing or new chips...
Twitter glitch allows CIA informant channel to be hijacked
US spies and informants could have been directed to hostile nations through a CIA mistake made on X....
Amazon Relational Database Service announces Dedicated Log Volume
Amazon Relational Database Service (Amazon RDS) now supports a Dedicated Log Volume for PostgreSQL, MySQL, and MariaDB databases....
Amazon Corretto October, 2023 Quarterly Updates
On Oct 17, 2023 Amazon announced quarterly security and critical updates for Amazon Corretto Long-Term Supported (LTS) versions...
AWS CodePipeline supports retrying a pipeline execution from the first action in a failed stage
Today, AWS CodePipeline announces support for retrying a pipeline execution from the first action in a stage that...