Deadglyph: New Advanced Backdoor with Distinctive Malware Tactics
Cybersecurity researchers have discovered a previously undocumented advanced backdoor dubbed Deadglyph employed by a threat actor known as Stealth Falcon...
Apple and Chrome Zero-Days Exploited to Hack Egyptian ex-MP with Predator Spyware
The three zero-day flaws addressed by Apple on September 21, 2023, were leveraged as part of an iPhone exploit chain...
c
Disclosure: Intel is a client of the author. At Intel’s Innovation conference this past week, the company highlighted...
TikTok frenzies ‘putting police and schools under strain’
The warning comes after a BBC investigation into disruption driven by the social media platform’s algorithms. Source:: BBC...
LastPass: ‘Horse Gone Barn Bolted’ is Strong Password
The password manager service LastPass is now forcing some of its users to pick longer master passwords. LastPass...
IAM Roles Anywhere is now available in the AWS GovCloud (US) Regions
AWS Identity and Access Management (IAM) Roles Anywhere is now available in the AWS GovCloud (US-East) and AWS...
Amazon Connect launches CloudFormation support for security profiles
Amazon Connect now supports AWS CloudFormation for security profiles. You can now use AWS CloudFormation templates to deploy...
AWS HealthImaging supports CloudFormation
AWS HealthImaging now supports AWS CloudFormation. With CloudFormation support, you can now use CloudFormation templates to create and...
Amazon DocumentDB (with MongoDB compatibility) supports in-place major version upgrade
Amazon DocumentDB (with MongoDB compatibility) now supports an in-place major version upgrade (MVU) from Amazon DocumentDB versions 3.6...
Amazon SNS message data protection can now de-identify outbound messages via redaction or masking
Amazon SNS message data protection is a set of capabilities that leverage pattern matching, machine learning models, and...
AWS App Runner launches improvements for Auto-Scaling configuration management
Today, AWS App Runner launched improvements for managing Auto-Scaling Configuration (ASC). App Runner makes it easier for developers...
New Variant of Banking Trojan BBTok Targets Over 40 Latin American Banks
An active malware campaign targeting Latin America is dispensing a new variant of a banking trojan called BBTok, particularly...
The AI future of Windows is here (next week)
The future of Windows AI. That’s what we’ve been hearing, and now Microsoft has shown us exactly what...
How to create your own iPhone-15-inspired ‘Action button’ on Android
If you’re reading this column, odds are, you don’t have a lot of iPhone envy. Believe me, I’m...
Early Bird Registration Now Open for the NICE K12 Cybersecurity Education Conference!
The NICE K12 Cybersecurity Education Conference Planning Committee is excited to announce that Early Bird Registration for the...
Biden-Harris Administration Announces Final National Security Guardrails for CHIPS for America Incentives Program
WASHINGTON — The U.S. Department of Commerce today released the final rule implementing the national security guardrails of...
Amazon Prime Video content to start including ads next year
Amazon says its Prime Video users will see ads on TV shows and movies unless they pay extra....
How to Interpret the 2023 MITRE ATT&CK Evaluation Results
Thorough, independent tests are a vital resource for analyzing provider’s capabilities to guard against increasingly sophisticated threats to...
Iranian Nation-State Actor OilRig Targets Israeli Organizations
Israeli organizations were targeted as part of two different campaigns orchestrated by the Iranian nation-state actor known as OilRig in...
Generative AI and US copyright law are on a collision course
US copyright law has yet to catch up to the numerous challenges posed by the wildfire adoption of...