Cisco Secure Email Gateway Email Filter Bypass Vulnerability
A vulnerability in the email filtering mechanism of Cisco Secure Email Gateway could allow an unauthenticated, remote attacker...
Cisco BroadWorks Application Delivery Platform Cross-Site Scripting Vulnerability
A vulnerability in the web-based management interface of Cisco BroadWorks Application Delivery Platform could allow an unauthenticated, remote...
SES Outbound now delivers to Mail Manager Archives
Amazon Simple Email Service (SES) announces that Outbound customers can now specify a Mail Manager archive resource as...
AWS Network Firewall introduces automated domain lists and insights
AWS Network Firewall now offers automated domain lists and insights, a feature that enhances visibility into network traffic...
CISA and FBI: Ghost ransomware breached orgs in 70 countries
CISA and the FBI said attackers deploying Ghost ransomware have breached victims from multiple industry sectors across over...
Phishing attack hides JavaScript using invisible Unicode trick
A new JavaScript obfuscation method utilizing invisible Unicode characters to represent binary values is being actively abused in...
Fortinet speeds threat detection with improved FortiAnalyzer
Fortinet has reinforced its FortiAnalyzer security analytics and log management platform with capabilities that enhance enterprise threat detection...
Amazon ECS increases the CPU limit for ECS tasks to 192 vCPUs
Amazon Elastic Container Service (Amazon ECS) now supports CPU limits of up to 192 vCPU for ECS tasks...
Announcing AWS DMS Serverless comprehensive premigration assessments
AWS Database Migration Service Serverless (AWS DMSS) now supports premigration assessments for replications . A premigration assessment evaluates...
Amazon RDS for MySQL supports new minor versions 8.0.41 and 8.4.4
Amazon Relational Database Service (Amazon RDS) for MySQL now supports MySQL minor versions 8.0.41 and 8.4.4. We recommend...
New FrigidStealer infostealer infects Macs via fake browser updates
The FakeUpdate malware campaigns are increasingly becoming muddled, with two additional cybercrime groups tracked as TA2726 and TA2727,...
Australian fertility services giant Genea hit by security breach
Genea, one of Australia’s largest fertility services providers, disclosed that unknown attackers breached its network and accessed data stored...
Spotlight: Drug Discovery Startup Protai Advances Complex Structure Prediction with AlphaFold, Proteomics, and NVIDIA NIM
Generative AI, especially with breakthroughs like AlphaFold and RosettaFold, is transforming drug discovery and how biotech companies and...
Apple gambles on new iPhone with AI features at lower cost
The tech giant is hoping AI at a lower price can reinvigorate sales of its flagship piece of...
Understanding the Language of Life’s Biomolecules Across Evolution at a New Scale with Evo 2
AI has evolved from an experimental curiosity to a driving force within biological research. The convergence of deep...
Hackers Exploit Signal’s Linked Devices Feature to Hijack Accounts via Malicious QR Codes
Multiple Russia-aligned threat actors have been observed targeting individuals of interest via the privacy-focused messaging app Signal to...
Powerful quantum computers in years not decades, says Microsoft
It says a new chip it has created could end up being as important a breakthrough as the...
Microsoft braids anyons into topological cubits on new Majorana quantum chip
Microsoft announced a breakthrough in quantum computing today, unveiling a new kind of quantum processing unit, using a...
Palo Alto Networks tags new firewall bug as exploited in attacks
Palo Alto Networks warns that hackers are actively exploiting a critical authentication bypass flaw (CVE-2025-0108) in PAN-OS firewalls,...
The Browser Blind Spot: Why Your Browser is the Next Cybersecurity Battleground
For years, defensive security strategies have focused on three core areas: network, endpoint, and email. Meanwhile, the browser,...