Will the FTC’s Lina Khan succeed in breaking up Amazon?
The FTC’s latest antitrust lawsuit accuses Amazon of using a web of anticompetitive strategies to maintain a monopoly,...
OpenRefine’s Zip Slip Vulnerability Could Let Attackers Execute Malicious Code
A high-severity security flaw has been disclosed in the open-source OpenRefine data cleanup and transformation tool that could...
BunnyLoader: New Malware-as-a-Service Threat Emerges in the Cybercrime Underground
Cybersecurity experts have discovered yet another malware-as-a-service (MaaS) threat called BunnyLoader that’s being advertised for sale on the cybercrime underground....
Zanubis Android Banking Trojan Poses as Peruvian Government App to Target Users
An emerging Android banking trojan called Zanubis is now masquerading as a Peruvian government app to trick unsuspecting...
The people going ‘monk mode’ to limit social media use
A growing number of individuals are using apps to block access to social media and the internet. Source::...
A Closer Look at the Snatch Data Ransom Group
Earlier this week, KrebsOnSecurity revealed that the darknet website for the Snatch ransomware group was leaking data about...
FBI Warns of Rising Trend of Dual Ransomware Attacks Targeting U.S. Companies
The U.S. Federal Bureau of Investigation (FBI) is warning of a new trend of dual ransomware attacks targeting...
Iranian APT Group OilRig Using New Menorah Malware for Covert Operations
Sophisticated cyber actors backed by Iran known as OilRig have been linked to a spear-phishing campaign that infects victims with...
New Critical Security Flaws Expose Exim Mail Servers to Remote Attacks
Multiple security vulnerabilities have been disclosed in the Exim mail transfer agent that, if successfully exploited, could result in information...
AWS Systems Manager Fleet Manager RDP now supports up to 1080p Resolution
AWS Systems Manager Fleet Manager enables customers to connect to their SSM managed instance through browser based RDP...
Comparing Solutions for Boosting Data Center Redundancy
In today’s data center, there are many ways to achieve system redundancy from a server connected to a...
Is that how it works? Hacking and scamming in popular TV shows
We like a good hacker story—and like the screens we watch them on, these stories come in wide...
AWS Fargate now supports Amazon ECS Windows containers in the AWS GovCloud (US) Regions
Today, AWS announces the availability of AWS Fargate for Amazon ECS Windows containers in the AWS GovCloud (US)...
Amazon Macie adds support for discovering more types of sensitive data
Amazon Macie has introduced new managed data identifiers to expand its capabilities for discovering and identifying Stripe API...
JNUC 2023: The top 5 changes JAMF unveiled
Heads-up, Apple-in-the-enterprise admins. One of the biggest annual events for Apple IT professionals, Jamf Nation User Conference, rolled...
Amazon Inspector is now available in additional commercial regions
Amazon Inspector is now available in four additional regions including Africa (Cape Town), Asia Pacific (Osaka), Asia Pacific...
VPC DNS Query Logging now available in the Israel (Tel Aviv) Region
Today, we are announcing the availability of Route 53 Resolver Query Logging in the Israel (Tel Aviv) Region....
AWS IoT Core for LoRaWAN announces support for public LoRaWAN networks (GA)
Today, AWS IoT Core for LoRaWAN announces the general availability of public network support for LoRaWAN-based Internet of...
Meta Quest 3’s mixed reality ‘passthrough’ broadens workplace appeal
Meta focused on bringing mixed reality to the masses at its Connect developer conference this week, rolling out...
Cybercriminals Using New ASMCrypt Malware Loader Flying Under the Radar
Threat actors are selling a new crypter and loader called ASMCrypt, which has been described as an “evolved version”...