Amazon CodeCatalyst supports deployments to Elastic Kubernetes Service
Today, Amazon Web Services announces support for deploying to Kubernetes clusters running on Elastic Kubernetes Service from an...
AWS Wickr offers federated data retention for internal and external conversations
AWS Wickr now offers Data Retention that extends to both internal and external communications in a Wickr network....
Introducing Amazon EC2 C7gd, M7gd, and R7gd Instances
AWS announces the general availability of Amazon Elastic Compute Cloud (Amazon EC2) C7gd instances, Amazon EC2 M7gd instances,...
Amazon SageMaker Studio Notebooks now support the G5 instance family in the South America (São Paulo region
Amazon SageMaker Studio launched support for the ml.G5 GPU instance family in the South America region (São Paulo)....
Apple toughens up app security with API control
Apple is at war with device fingerprinting — the use of fragments of unique device-specific information to track...
AWS Lake Formation launches Read-Only Administrator role
AWS Lake Formation is launching a Read-Only Administrator role which enables customers to add a Data Lake Administrator...
Technologists should focus on proactivity, not reactivity, to deliver on Industry 4.0 goals
As we seek to build smarter factories, embrace new business models, and streamline operations, manufacturers of all shapes...
Kenya cyber-attack: Why is eCitizen down?
A key government online platform has been down for several days and mobile money services are also affected....
IcedID Malware Adapts and Expands Threat with Updated BackConnect Module
The threat actors linked to the malware loader known as IcedID have made updates to the BackConnect (BC)...
STARK#MULE Targets Koreans with U.S. Military-themed Document Lures
An ongoing cyber attack campaign has set its sights on Korean-speaking individuals by employing U.S. Military-themed document lures...
A Data Exfiltration Attack Scenario: The Porsche Experience
As part of Checkmarx’s mission to help organizations develop and deploy secure software, the Security Research team started looking at...
Hackers Abusing Windows Search Feature to Install Remote Access Trojans
A legitimate Windows search feature is being exploited by malicious actors to download arbitrary payloads from remote servers...
AMD to invest $400 million in new design center in India
Chipmaker AMD on Friday said it will invest $400 million in India over the next five years to...
Mark Zuckerberg: Threads users down by more than a half
The rival to Twitter saw explosive growth but users have since drifted away, Meta boss acknowledges. Source:: BBC...
Anomaly detection in certificate-based TGT requests
One of the most complex yet effective methods of gaining unauthorized access to corporate network resources is an...
AI tools could leave companies liable for anti-bias missteps
As lawmakers and others work to address privacy, security, and bias problems with generative artificial intelligence (AI), experts...
BlueBravo Deploys GraphicalProton Backdoor Against European Diplomatic Entities
The Russian nation-state actor known as BlueBravo has been observed targeting diplomatic entities throughout Eastern Europe with the goal of...
Microsoft faces EU antitrust probe for bundling Teams with M365
Microsoft is facing an antitrust probe in Europe for bundling Teams with Microsoft 365. The European Commission —...
Major Security Flaw Discovered in Metabase BI Software – Urgent Update Required
Users of Metabase, a popular business intelligence and data visualization software package, are being advised to update to...
Cybersecurity Agencies Warn Against IDOR Bugs Exploited for Data Breaches
Cybersecurity agencies in Australia and the U.S. have published a joint cybersecurity advisory warning against security flaws in web applications...