LockBit Green and phishing that targets organizations
Introduction In recent months, we published private reports on a broad range of subjects. We wrote about malware...
IT firms expect to increase hiring next quarter, Manpower says
While organizations across all US industries are expected to boost hiring in the third quarter, employers in the...
Tech battle: Musk and Zuckerberg agree to hold cage fight
Earlier this month, Meta showed staff plans for a text-based social network designed to compete with Twitter. Source::...
Elon Musk: Australia issues legal warning to Twitter over online hate
Elon Musk bought the firm last year for $44bn and promised to protect free speech on the platform....
Threats and key takeaways for the legal sector
New NCSC report outlines the growing threat to the legal sector, with recommendations to improve cyber resilience. Source::...
Cyber Threat Report: UK Legal Sector
An updated report from the NCSC explaining how UK law firms – of all sizes – can protect...
Cisco Secure Email Gateway, Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance Cross-Site Scripting Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager;...
Cisco Duo Two-Factor Authentication for macOS Authentication Bypass Vulnerability
A vulnerability in Cisco Duo Two-Factor Authentication for macOS could allow an authenticated, physical attacker to bypass secondary...
Tagging support for AWS Purchase Order Management
Today, AWS Purchase Order Management announces the general availability of ‘Attribute-based & Resource-based access control’ for purchase orders...
AWS Elemental MediaConvert releases bandwidth reduction filter for HEVC and AVC
Today, AWS announces the general availability of bandwidth reduction filtering for the AVC and HEVC encoders in AWS...
AWS Lambda supports starting from timestamp for Kafka event sources
AWS Lambda now supports starting from a specific timestamp when using Amazon Managed Streaming for Apache Kafka (MSK)...
Webinar: Unleash the Power of Vision Transformers
Learn how Vision Transformers are revolutionizing AI applications with image understanding and analysis. Learn how Vision Transformers are...
Amazon EC2 M6gd instances are now available in Europe (Paris) region
Starting today, Amazon Elastic Compute Cloud (Amazon EC2) M6gd instances are available in Europe (Paris) region. These instances...
Amazon accused of tricking Prime customers
The US has sued Amazon for allegedly manipulating customers during the Prime sign-up process. Source:: BBC News –...
Amazon Redshift improves the experience for encrypting the data warehouse
Amazon Redshift offers comprehensive encryption capabilities to protect your data at rest. Now, Amazon Redshift further enhances the...
New EU security strategy aims to safeguard tech supply chains
A draft strategy published this week by the EU would impose export controls on critical technology and protect...
Transform data into ML features using SageMaker Feature Store feature processing
Amazon SageMaker Feature Store now supports feature processing, a new capability that enables you to transform data into...
Why Malware Crypting Services Deserve More Scrutiny
If you operate a cybercrime business that relies on disseminating malicious software, you probably also spend a good...
AWS Application Discovery Service introduces Amazon EC2 recommendations
Today, AWS Application Discovery Service introduces a public API to estimate the cost of running your existing on-premises...
Amazon EMR now publishes events for insufficient instance capacity errors
Today, we are excited to announce that Amazon EMR now publishes events for insufficient instance capacity. This launch...