AWS WAF Bot Control now protects against distributed proxy-based attacks
AWS WAF Bot Control for Targeted Bots now offers predictive Machine Learning (ML) technology to provide protection against...
Amazon SageMaker Inference now supports Multi Model Endpoints for PyTorch
SageMaker Multi-Model Endpoint (MME) is a fully managed capability that allows customers to deploy 1000s of models on a...
Amazon Location Service is now available in AWS GovCloud (US-West) Region
Today, we are announcing the availability of Amazon Location Service in the AWS GovCloud (US-West) Region. Amazon Location...
Government denies U-turn on encrypted messaging row
The government states that the tech tools for accessing private messages don’t yet exist. Source:: BBC News –...
Supercharge Ransomware Detection with AI-Enhanced Cybersecurity Solutions
Ransomware attacks have become increasingly popular, more sophisticated, and harder to detect. For example, in 2022, a destructive...
Amazon EC2 M6i and R6i instances are now available in Europe (Zurich) region
Starting today, Amazon Elastic Compute Cloud (Amazon EC2) M6i and R6i instances are available in AWS Europe (Zurich)...
Amazon CloudWatch Logs announces regular expression filter pattern syntax support
We are excited to announce regular expression support for Amazon CloudWatch Logs filter pattern syntax, making it easier...
Intuit debuts generative AI for QuickBooks, TurboTax, and other major products
Financial services and small-business software provider Intuit will be rolling out an “Intuit Assist” feature to all of...
AWS Backup launches resource exclusion for AWS CloudFormation stack
Today, AWS Backup announces support for AWS CloudFormation resource exclusion, allowing you to exclude resources from your application...
Amazon EC2 C6gd and R6gd instances are now available in AWS GovCloud (US-West) Region
Starting today, Amazon EC2 C6gd and R6gd instances powered by AWS Graviton2 processors are available in the AWS...
UK rolls back controversial encryption rules of Online Safety Bill
The UK government has conceded one of the more controversial parts of its Online Safety Bill, stating that...
VPC DNS Query Logging now available in five new AWS Regions
Today, we are announcing the availability of Route 53 Resolver Query Logging in the Asia Pacific (Hyderabad), Asia...
Amazon MSK is now available in Israel (Tel Aviv) Region
Amazon Managed Streaming for Apache Kafka (Amazon MSK) is now available in Israel (Tel Aviv) Region. Amazon MSK...
GPUs for ETL? Optimizing ETL Architecture for Apache Spark SQL Operations
Extract-transform-load (ETL) operations with GPUs using the NVIDIA RAPIDS Accelerator for Apache Spark running on large-scale data can...
Apple saves its chips with multi-year Arm IP deal
If you had any remaining doubt about Apple’s long-term plans for processor development, you should note the significance...
Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Stack Overflow Vulnerability
A vulnerability in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could...
Cisco Identity Services Engine RADIUS Denial of Service Vulnerability
A vulnerability in the RADIUS message processing feature of Cisco Identity Services Engine (ISE) could allow an unauthenticated,...
Cisco Identity Services Engine Privilege Escalation Vulnerabilities
Multiple vulnerabilities in Cisco Identity Services Engine (ISE) could allow an authenticated attacker to perform privilege escalation attacks...
Cisco HyperFlex HX Data Platform Open Redirect Vulnerability
A vulnerability in the web-based management interface of Cisco HyperFlex HX Data Platform could allow an unauthenticated, remote...
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Access VPN Unauthorized Access Vulnerability
A vulnerability in the remote access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower...