Urgent: Critical WordPress Plugin Vulnerability Exposes Over 4 Million Sites
A critical authentication bypass vulnerability has been disclosed in the Really Simple Security (formerly Really Simple SSL) plugin...
Product Recall: PowerXL Stuffed Wafflizer Waffle Makers (2311-0246)
Source:: UK Gov Product Safety Alerts, Reports and Recalls
Product Recall: Jonas 1 Litre Colourways Plastic Drinks Bottle sold by Morrisons (2411-0093)
Source:: UK Gov Product Safety Alerts, Reports and Recalls
Product Recall: Empower Power XL Self-Cleaning Juicer (2311-0248)
Source:: UK Gov Product Safety Alerts, Reports and Recalls
Phishing emails increasingly use SVG attachments to evade detection
Threat actors increasingly use Scalable Vector Graphics (SVG) attachments to display phishing forms or deploy malware while evading...
Security plugin flaw in millions of WordPress sites gives admin access
A critical authentication bypass vulnerability has been discovered impacting the WordPress plugin ‘Really Simple Security’ (formerly ‘Really Simple SSL’),...
‘Record breaking’ 60m homes watched Tyson vs Paul fight, Netflix says
But the streaming giant’s first foray into live boxing was beset with technical glitches. Source:: BBC News –...
‘Do not pet’: Why are robot dogs patrolling Mar-A-Lago?
Robotic dogs are helping law enforcement protect President-elect Donald Trump at his Florida residence. Source:: BBC News –...
Fake AI video generators infect Windows, macOS with infostealers
Fake AI image and video generators infect Windows and macOS with the Lumma Stealer and AMOS information-stealing malware,...
T-Mobile confirms it was hacked in recent wave of telecom breaches
T-Mobile confirms it was hacked in the wave of recently reported telecom breaches conducted by Chinese threat actors...
GitHub projects targeted with malicious commits to frame researcher
GitHub projects have been targeted with malicious commits and pull requests, in an attempt to inject backdoors into these projects. Most...
PAN-OS Firewall Vulnerability Under Active Exploitation – IoCs Released
Palo Alto Networks has released new indicators of compromise (IoCs) a day after the network security vendor confirmed...
Warning: DEEPDATA Malware Exploiting Unpatched Fortinet Flaw to Steal VPN Credentials
A threat actor known as BrazenBamboo has exploited an unresolved security flaw in Fortinet’s FortiClient for Windows to...
NVIDIA NIM 1.4 Ready to Deploy with 2.4x Faster Inference
The demand for ready-to-deploy high-performance inference is growing as generative AI reshapes industries. NVIDIA NIM provides production-ready microservice…...
Amazon SageMaker Notebook Instances now support Trainium1 and Inferentia 2 based instances
We are pleased to announce general availability of Trainium1 and Inferentia2 based EC2 instances on SageMaker Notebook Instances....
AWS Application Load Balancer announces CloudFront integration with built-in WAF
We are announcing a new one-click integration on Application Load Balancer (ALB) to attach an Amazon CloudFront distribution...
NSO Group used another WhatsApp zero-day after being sued, court docs say
Israeli surveillance firm NSO Group reportedly used multiple zero-day exploits, including an unknown one named “Erised,” that leveraged...
AI, cybersecurity drive IT investments and lead skill shortages for 2025
AI and cybersecurity are driving enterprise tech investments and at the same time exposing the talent gaps that...
AWS IoT Core adds capabilities to enrich MQTT messages and simplify permission management
AWS IoT Core, a managed cloud service that lets you securely connect Internet of Things (IoT) devices to...
Amazon Data Firehose supports continuous replication of database changes to Apache Iceberg Tables in Amazon S3
Amazon Data Firehose now enables capture and replication of database changes to Apache Iceberg Tables in Amazon S3...