Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers Command Injection Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN...
Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325...
Cisco Secure Network Analytics Remote Code Execution Vulnerability
A vulnerability in the web-based management interface of Cisco Secure Network Analytics could allow an authenticated, remote attacker...
Cisco Secure Network Analytics Remote Code Execution Vulnerability
A vulnerability in Cisco Secure Network Analytics could allow an authenticated, remote attacker to execute arbitrary code as...
Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM)...
Cisco Packet Data Network Gateway IPsec ICMP Denial of Service Vulnerability
A vulnerability in the Vector Packet Processor (VPP) of Cisco Packet Data Network Gateway (PGW) could allow an...
Cisco Meraki Local Status Page Configuration Hardening
Cisco Meraki devices implement a Local Status Page (LSP) feature. This is a web-based interface that is primarily...
Cisco Identity Services Engine Command Injection Vulnerabilities
Multiple vulnerabilities in specific Cisco Identity Services Engine (ISE) CLI commands could allow an authenticated, local attacker to...
Cisco Evolved Programmable Network Manager, Cisco Identity Services Engine, and Cisco Prime Infrastructure Command Injection Vulnerabilities
Multiple vulnerabilities in the restricted shell of Cisco Evolved Programmable Network Manager (EPNM), Cisco Identity Services Engine (ISE),...
Cisco Duo Authentication for macOS and Duo Authentication for Windows Logon Offline Credentials Replay Vulnerability
A vulnerability in the offline access mode of Cisco Duo Two-Factor Authentication for macOS and Duo Authentication for...
AWS Controllers for Kubernetes (ACK) for Amazon MemoryDB is now generally available
The AWS Controllers for Kubernetes (ACK) service controller for Amazon MemoryDB for Redis is now generally available. Customers...
Amazon Kinesis Data Analytics is now available in additional AWS regions
Amazon Kinesis Data Analytics for Apache Flink is now available in three additional AWS regions: Europe (Spain), Europe...
Amazon HealthLake now available in Asia-Pacific (Mumbai) AWS region
Starting today, healthcare and life sciences customers can use Amazon HealthLake in the Asia Pacific (Mumbai) AWS Region. ...
Amazon Virtual Private Cloud now supports Bring your own IP in two additional AWS Regions
Starting today, Bring Your Own IP (BYOIP) is available in two additional AWS Regions: Asia Pacific (Jakarta) and...
Amazon SageMaker is now available in Asia Pacific (Hyderabad) Region
Starting today, you can build, train, and deploy machine learning (ML) models in Asia Pacific (Hyderabad) Region. Source::...
Amazon CloudFront supports S3 Object Lambda Access Point origin
Starting today, Amazon CloudFront supports the use of S3 Object Lambda Access Points as origins. This means that...
Amazon S3 beginning to apply two security best practices to all new buckets by default
As announced on December 13, 2022, Amazon S3 is now deploying two new default bucket security settings by...
AWS Network Firewall now supports IPv6-only subnets
AWS Network Firewall now supports IPv6-only subnets, in addition to dual stack (IPv4 and IPv6) subnets. Starting today,...
AWS CloudFormation StackSets is now available in 2 additional AWS Regions
Today, AWS CloudFormation has expanded the availability of StackSets to Middle East (UAE) and Asia Pacific (Hyderabad) Regions....
Setting New Records in MLPerf Inference v3.0 with Full-Stack Optimizations for AI
The most exciting computing applications currently rely on training and running inference on complex AI models, often in...