Massive PSAUX ransomware attack targets 22,000 CyberPanel instances
Over 22,000 CyberPanel instances exposed online to a critical remote code execution (RCE) vulnerability were mass-targeted in a...
AI-Powered Devices Track Howls to Save Wolves
A new cell-phone-sized device—which can be deployed in vast, remote areas—is using AI to identify and geolocate wildlife...
QNAP fixes NAS backup software zero-day exploited at Pwn2Own
QNAP has fixed a critical zero-day vulnerability exploited by security researchers on Thursday to hack a TS-464 NAS...
Amazon MemoryDB for Valkey adds new CloudWatch metrics to monitor server-side response time
Amazon MemoryDB for Valkey now supports server-side write request latency and read request latency metrics. With this launch,...
Amazon ElastiCache for Valkey adds new CloudWatch metrics to monitor server-side response time
ElastiCache for Valkey self-designed (node-based) clusters now support server-side write request latency and read request latency metrics. With...
AWS Clean Rooms launches Spark SQL support with configurable compute size
Today, AWS announces the launch of AWS Clean Rooms Spark SQL, offering customers the ability to run custom...
Amazon RDS now supports M7i and R7i database instances
Amazon Relational Database Service (Amazon RDS) for PostgreSQL, MySQL, and MariaDB now supports M7i and R7i database (DB)...
Amazon OpenSearch Service now supports dedicated coordinator nodes
Amazon OpenSearch Service now offers customers the option to provision a dedicated coordinator node. Dedicated coordinator nodes relieve...
Amazon EC2 Mac instances now support Apple macOS Sequoia
Starting today, customers can run Apple macOS Sequoia (version 15) as Amazon Machine Images (AMIs) on Amazon EC2...
AWS CodeBuild now supports retrying builds automatically
AWS CodeBuild now enables customers to configure automatic retries for their builds, reducing manual intervention upon build failures....
Enhanced Security and Streamlined Deployment of AI Agents with NVIDIA AI Enterprise
AI agents are emerging as the newest way for organizations to increase efficiency, improve productivity, and accelerate innovation....
Cyber Resilience Audit (CRA) scheme launches for assured CAF-based audits
NCSC-assured CRA service now offering Cyber Assessment Framework based audits and more applications invited from potential service providers....
Risk reduction redefined: How compromise assessment helps strengthen cyberdefenses
Introduction Organizations often rely on a layered defense strategy, yet breaches still occur, slipping past multiple levels of...
Migrating billions of records: moving our active DNS database while it’s in use
According to a survey done by W3Techs, as of October 2024, Cloudflare is used as an authoritative DNS...
Russian charged by U.S. for creating RedLine infostealer malware
The United States announced charges today against Maxim Rudometov, a Russian national, for being the suspected developer and...
Researchers Uncover Vulnerabilities in Open-Source AI and ML Models
A little over three dozen security vulnerabilities have been disclosed in various open-source artificial intelligence (AI) and machine...
Amazon Q Developer announces support for inline chat to streamline the developer experience
Today, Amazon Q Developer announces an enhanced chat experience that allows you to seamlessly initiate chat within the...
Forced offline: the Q3 2024 Internet disruption summary
Cloudflare’s network spans more than 330 cities in over 120 countries, where we interconnect with over 13,000 network...
A Sherlock Holmes Approach to Cybersecurity: Eliminate the Impossible with Exposure Validation
Sherlock Holmes is famous for his incredible ability to sort through mounds of information; he removes the irrelevant...
Dutch Police Disrupt Major Info Stealers RedLine and MetaStealer in Operation Magnus
The Dutch National Police, along with international partners, have announced the disruption of the infrastructure powering two information...