Are You Willing to Pay the High Cost of Compromised Credentials?
Weak password policies leave organizations vulnerable to attacks. But are the standard password complexity requirements enough to secure...
Q&A: How one CSO secured his environment from generative AI risks
In February, travel and expense management company Navan (formerly TripActions) chose to go all-in on generative AI technology...
From Watering Hole to Spyware: EvilBamboo Targets Tibetans, Uyghurs, and Taiwanese
Tibetan, Uyghur, and Taiwanese individuals and organizations are the targets of a persistent campaign orchestrated by a threat...
New Report Uncovers Three Distinct Clusters of China-Nexus Attacks on Southeast Asian Government
An unnamed Southeast Asian government has been targeted by multiple China-nexus threat actors as part of espionage campaigns...
How the fall of the ‘King of Crypto’ cost one British man millions
As Sam Bankman-Fried awaits trial for fraud, his former investors wonder if they will ever recoup their losses....
Farmers turn to tech as bees struggle to pollinate
With bee populations struggling, mechanical pollination may be increasingly needed as a back-up. Source:: BBC News – Technology
Deadglyph: New Advanced Backdoor with Distinctive Malware Tactics
Cybersecurity researchers have discovered a previously undocumented advanced backdoor dubbed Deadglyph employed by a threat actor known as Stealth Falcon...
Apple and Chrome Zero-Days Exploited to Hack Egyptian ex-MP with Predator Spyware
The three zero-day flaws addressed by Apple on September 21, 2023, were leveraged as part of an iPhone exploit chain...
c
Disclosure: Intel is a client of the author. At Intel’s Innovation conference this past week, the company highlighted...
TikTok frenzies ‘putting police and schools under strain’
The warning comes after a BBC investigation into disruption driven by the social media platform’s algorithms. Source:: BBC...
LastPass: ‘Horse Gone Barn Bolted’ is Strong Password
The password manager service LastPass is now forcing some of its users to pick longer master passwords. LastPass...
IAM Roles Anywhere is now available in the AWS GovCloud (US) Regions
AWS Identity and Access Management (IAM) Roles Anywhere is now available in the AWS GovCloud (US-East) and AWS...
Amazon Connect launches CloudFormation support for security profiles
Amazon Connect now supports AWS CloudFormation for security profiles. You can now use AWS CloudFormation templates to deploy...
AWS HealthImaging supports CloudFormation
AWS HealthImaging now supports AWS CloudFormation. With CloudFormation support, you can now use CloudFormation templates to create and...
Amazon DocumentDB (with MongoDB compatibility) supports in-place major version upgrade
Amazon DocumentDB (with MongoDB compatibility) now supports an in-place major version upgrade (MVU) from Amazon DocumentDB versions 3.6...
Amazon SNS message data protection can now de-identify outbound messages via redaction or masking
Amazon SNS message data protection is a set of capabilities that leverage pattern matching, machine learning models, and...
AWS App Runner launches improvements for Auto-Scaling configuration management
Today, AWS App Runner launched improvements for managing Auto-Scaling Configuration (ASC). App Runner makes it easier for developers...
New Variant of Banking Trojan BBTok Targets Over 40 Latin American Banks
An active malware campaign targeting Latin America is dispensing a new variant of a banking trojan called BBTok, particularly...
The AI future of Windows is here (next week)
The future of Windows AI. That’s what we’ve been hearing, and now Microsoft has shown us exactly what...
How to create your own iPhone-15-inspired ‘Action button’ on Android
If you’re reading this column, odds are, you don’t have a lot of iPhone envy. Believe me, I’m...