CERT-UA Reports: 11 Ukrainian Telecom Providers Hit by Cyberattacks
The Computer Emergency Response Team of Ukraine (CERT-UA) has revealed that threat actors “interfered” with at least 11...
Warning: Unpatched Cisco Zero-Day Vulnerability Actively Targeted in the Wild
Cisco has warned of a critical, unpatched security flaw impacting IOS XE software that’s under active exploitation in...
The incredible power of blue LEDs
LEDs dominate lighting systems but their efficiency rests on the tricky production of blue light. Source:: BBC News...
German Chancellor Olaf Scholz could snub British AI summit
The BBC understands the German chancellor may turn down his invitation to the event on 1 November. Source::...
Principles for ransomware-resistant cloud backups
Helping to make cloud backups resistant to the effects of destructive ransomware. Source:: NCSC Guidance
Our new principles to help make cloud backups more resilient
Introducing a new set of NCSC principles to strengthen the resilience of organisations’ cloud backups from ransomware attackers....
Introducing Recover into Existing Instance for AWS Elastic Disaster Recovery
Today, AWS Elastic Disaster Recovery (AWS DRS) announces the general availability of Recover Into Existing Instance, which allows...
Bitcoin Testnet and new Asset APIs now available for Amazon Managed Blockchain Query
Amazon Managed Blockchain (AMB) Query now supports the Bitcoin Testnet to develop and test applications without risking real...
AWS Entity Resolution launches records matching with data service providers
Today, AWS Entity Resolution launches a new capability to help you link and enhance your records with trusted...
Introducing Amazon EC2 R7i instances
AWS announces the general availability of Amazon Elastic Compute Cloud (Amazon EC2) R7i instances powered by custom 4th...
CloudWatch launches out-of-the-box alarm recommendations for AWS services
Amazon CloudWatch announces out-of-the box, best practice alarm recommendations for AWS service-vended metrics. It provides alarm recommendations and...
AWS Client VPN extends availability to three additional AWS Regions
Starting today, customers can use AWS Client VPN in three additional Asia Pacific (Osaka, Hyderabad, and Jakarta) Regions....
Security analytics in OpenSearch Service now supports OCSF and custom logs
Security analytics in Amazon OpenSearch Service adds native support for Open Cybersecurity Schema Framework (OCSF) formatted data and...
Settlement talks collapse in Kenya Facebook redundancies case
Legal action by Nairobi-based workers who filtered out graphic Facebook posts will continue. Source:: BBC News – Technology
Generative AI spending to reach $143B in 2027: IDC
Enterprise spending on generative AI services, software and infrastructure will skyrocket over the next four years, jumping from...
Generative AI spending to reach $143 billion in 2027: IDC
Enterprise spending on generative AI services, software and infrastructure will skyrocket over the next four years, jumping from...
LinkedIn: Microsoft says 668 more jobs to go
The company, which is owned my Microsoft, is cutting about 3% of its workforce. Source:: BBC News –...
A hack in hand is worth two in the bush
The ongoing conflict between Israel and Hamas has also extended into the digital domain. The involvement of hackers...
HTTP/2 Rapid Reset Attack Affecting Cisco Products: October 2023
On October 10, 2023, the following HTTP/2 protocol-level weakness, which enables a novel distributed denial of service (DDoS)...
How to use Presenter Overlay for better Zoom calls on Macs
As Macs proliferate across the enterprise, and with macOS Sonoma now out, here’s a new macOS Sonoma trick...