N. Korean Lazarus Group Targets Software Vendor Using Known Flaws
The North Korea-aligned Lazarus Group has been attributed as behind a new campaign in which an unnamed software vendor was...
How to Keep Your Business Running in a Contested Environment
When organizations start incorporating cybersecurity regulations and cyber incident reporting requirements into their security protocols, it’s essential for...
Google Expands Its Bug Bounty Program to Tackle Artificial Intelligence Threats
Google has announced that it’s expanding its Vulnerability Rewards Program (VRP) to reward researchers for finding attack scenarios...
Microsoft invested $13B in genAI — does Copilot for Windows show it’s a bad bet?
In the decades I’ve been writing about technology, I’ve never seen a something take off as fast as...
You know what? Everyone gets a virus now and then.
I will never forget the first time I caught a digital bug. I was sitting at my desk...
A cascade of compromise: unveiling Lazarus’ new campaign
Earlier this year, a software vendor was compromised by the Lazarus malware delivered through unpatched legitimate software. What’s...
F5 Issues Warning: BIG-IP Vulnerability Allows Remote Code Execution
F5 has alerted customers of a critical security vulnerability impacting BIG-IP that could result in unauthenticated remote code...
FTX: ‘Crypto King’ tells judge he acted on legal advice
Former crypto boss Sam Bankman-Fried testifies to fraud trial judge after jury sent home. Source:: BBC News –...
What happens after a nuclear power station is closed?
Taking decades, an intricate clean-up process has to be followed after a nuclear power station closes. Source:: BBC...
After a year of Elon Musk, what’s next for X?
How the billionaire’s purchase of Twitter has changed the platform and what the future may hold. Source:: BBC...
Logging Made Easy with CISA
The US Cybersecurity and Infrastructure Security Agency have relaunched an updated version of LME. Source:: NCSC Guidance
AWS Network Firewall announces support for egress TLS inspection in 2 regions
AWS Network Firewall now supports egress Transport Layer Security (TLS) inspection, enabling customers to strengthen their security posture...
Amazon OpenSearch Service now supports Internet Protocol Version 6 (IPv6)
Amazon OpenSearch Service now offers customers the option to use Internet Protocol version 6 (IPv6) addresses for their...
AWS User Notifications is now available in Israel (Tel Aviv) Region
AWS User Notifications is now available in Israel (Tel Aviv) AWS Region. User Notifications enables you to view...
Amazon AppStream 2.0 announces multi-session fleets for Windows Server OS
Today, AWS announces multi-session capability for Amazon AppStream 2.0 fleets powered by Microsoft Windows server operating system. This...
Amazon EC2 I4i instances introduce two new sizes: I4i.12xlarge and I4i.24xlarge
Starting today, Amazon EC2 I4i instances are now available in two additional instance sizes I4i.12xlarge and I4i.24xlarge in 28...
Multi-VPC ENI Attachments
AWS announces the general availability of multi-Virtual Private Cloud (VPC) elastic network interface (ENI) attachments for Amazon Elastic...
Generative AI training data sets are now trackable – and often legally complicated
A new online tool allows users to identify, track and learn about the legal status of training data...
AWS Systems Manager OpsCenter now supports deletion of operational issues
Starting today, OpsCenter, a capability of AWS Systems Manager, provides a new API to delete operational issues (OpsItems)....
Amazon Kendra launches feature to collapse and expand query results
Amazon Kendra is an intelligent search service powered by machine learning, enabling organizations to provide relevant information to...