Chinese hackers abuse Microsoft APP-v tool to evade antivirus
The Chinese APT hacking group “Mustang Panda” has been spotted abusing the Microsoft Application Virtualization Injector utility as a...
Amazon Timestream for InfluxDB Adds Read Replica support
Amazon Timestream for InfluxDB now supports Read Replicas, enabling customers to scale their read operations across multiple instances...
Amplify Hosting announces support for IAM roles for server-side rendered (SSR) applications
We’re excited to announce the launch of IAM compute roles for AWS Amplify Hosting, enabling secure connections to...
AWS Storage Gateway is now available in AWS Mexico (Central) Region
AWS Storage Gateway expands availability to the AWS Mexico (Central) Region enabling customers to deploy and manage hybrid...
New OpenSSH flaws expose SSH servers to MiTM and DoS attacks
OpenSSH has released security updates addressing two vulnerabilities, a machine-in-the-middle (MitM) and a denial of service flaw, with...
Juniper patches critical auth bypass in Session Smart routers
Juniper Networks has patched a critical vulnerability that allows attackers to bypass authentication and take over Session Smart...
Compliance Isn’t Security: Why a Checklist Won’t Stop Cyberattacks
Think you’re safe because you’re compliant? Think again. Recent studies continue to highlight the concerning trend that compliance...
7 time-saving Linux commands
Some Linux commands can make your time on the command line easier and more productive. This post covers...
New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks — Patch Now
Two security vulnerabilities have been discovered in the OpenSSH secure networking utility suite that, if successfully exploited, could...
Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks
The Chinese state-sponsored threat actor known as Mustang Panda has been observed employing a novel technique to evade...
Want to transform networking? Empower the missing users
As 2025 kicked off, I wrote a column about the network vendor landscape – specifically, which networking players...
Data center spending to top $1 trillion by 2029 as AI transforms infrastructure
Massive global demand for AI technology is causing data centers to increase spending on servers, power, and cooling...
New FrigidStealer Malware Targets macOS Users via Fake Browser Updates
Cybersecurity researchers are alerting to a new campaign that leverages web injects to deliver a new Apple macOS...
Lee Enterprises newspaper disruptions caused by ransomware attack
Newspaper publishing giant Lee Enterprises has confirmed that a ransomware attack is behind ongoing disruptions impacting the group’s...
Juniper Session Smart Routers Vulnerability Could Let Attackers Bypass Authentication
Juniper Networks has released security updates to address a critical security flaw impacting Session Smart Router, Session Smart...
‘Hopeless’ to potentially handy: law firm puts AI to the test
Despite ‘incredible’ progress AI tools still aren’t up to the level of even a junior lawyer, research suggests....
Argentina’s President Milei denies crypto fraud allegations
Javier Milei says he was acting in “good faith” when he posted about a crypto currency which collapsed....
DeepSeek ‘shared user data’ with TikTok owner ByteDance
South Korea’s data protection regulator says user data was sent to the Chinese owner of TikTok. Source:: BBC...
Debunking the AI Hype: Inside Real Hacker Tactics
Is AI really reshaping the cyber threat landscape, or is the constant drumbeat of hype drowning out actual,...
Winnti APT41 Targets Japanese Firms in RevivalStone Cyber Espionage Campaign
The China-linked threat actor known as Winnti has been attributed to a new campaign dubbed RevivalStone that targeted...