THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 18 – Nov 24)
We hear terms like “state-sponsored attacks” and “critical vulnerabilities” all the time, but what’s really going on behind...
Orbia streamlines security across global sites with SASE
A push for greater network visibility and global security standards drove Orbia, an $8.2 billion company that operates...
Advanced threat predictions for 2025
We at Kaspersky’s Global Research and Analysis Team monitor over 900 APT (advanced persistent threat) groups and operations....
Dell adds to PowerEdge server lineup
Dell Technologies introduced new hardware products and services at two separate conferences, the Supercomputing 24 show in Atlanta...
Cerebras claims record in molecular dynamics simulations, says it’s 748x faster than Frontier supercomputer
Cerebras Systems, the maker of an AI “chip” the size of a pizza box, is making some impressive...
Researchers Uncover Malware Using BYOVD to Bypass Antivirus Protections
Cybersecurity researchers have uncovered a new malicious campaign that leverages a technique called Bring Your Own Vulnerable Driver...
Meta removes over 2 million accounts pushing pig butchering scams
Meta announced that it has taken down 2 million accounts across its platforms since the beginning of the...
Bangkok busts SMS Blaster sending 1 million scam texts from a van
The Thai police, working together with Thailand’s largest telecommunications service provider, Advanced Info Service (AIS), located and busted...
Windows 11 24H2 update blocked on PCs with Assassin’s Creed, Star Wars Outlaws
Microsoft is blocking the Windows 11 24H2 update on computers with some Ubisoft games, like Assassin’s Creed, Star...
Microsoft testing Windows 11 support for third-party passkeys
Microsoft is now testing WebAuthn API updates that add support for support for using third-party passkey providers for...
Hackers abuse Avast anti-rootkit driver to disable defenses
A new malicious campaign is using a legitimate but old and vulnerable Avast Anti-Rootkit driver to evade detection...
Google Exposes GLASSBRIDGE: A Pro-China Influence Network of Fake News Sites
Government agencies and non-governmental organizations in the United States have become the target of a nascent China state...
North Korean Hackers Steal $10M with AI-Driven Scams and Malware on LinkedIn
The North Korea-linked threat actor known as Sapphire Sleet is estimated to have stolen more than $10 million...
Conservationists turn to AI in battle to save red squirrels
The tech is being used to automatically control the creatures’ access to feeders at sites across the UK....
AWS Application Load Balancer introduces Certificate Authority advertisement to simplify client behavior while using Mutual TLS
Application Load balancer (ALB) now supports advertise Certificate Authority (CA) subject name stored in its associated Trust Store...
AWS Application Discovery Service now supports data from commercially available discovery tools
Today, AWS announces additional file support for AWS Application Discovery Service (ADS), which adds the ability to import...
Amazon S3 Connector for PyTorch now supports Distributed Checkpoint
Amazon S3 Connector for PyTorch now supports Distributed Checkpoint (DCP), improving the time to write checkpoints to Amazon...
Amazon EC2 Auto Scaling introduces highly responsive scaling policies
Today, we are launching two new capabilities to EC2 Auto Scaling (ASG) that improve the responsiveness of Target...
Windows 10 KB5046714 update fixes bug preventing app uninstalls
Microsoft has released the optional KB5046714 Preview cumulative update for Windows 10 22H2 with six bug fixes, including...
Find security, compliance, and operating metrics in AWS Resource Explorer
Today, AWS announced the general availability of a new console experience in AWS Resource Explorer that centralizes resource...