Featured Sessions for Students at NVIDIA GTC 2025
Learn from researchers, scientists, and industry leaders across a variety of topics including AI, robotics, and Data Science....
Hackers exploit authentication bypass in Palo Alto Networks PAN-OS
Hackers are launching attacks against Palo Alto Networks PAN-OS firewalls by exploiting a recently fixed vulnerability (CVE-2025-0108) that allows...
Amazon SES now offers tiered pricing for Virtual Deliverability Manager
Today, Amazon Simple Email Service (SES) launched a new pricing structure for Virtual Deliverability Manager (VDM), giving customers...
Palo Alto Networks firewall bug being exploited by threat actors: Report
Admins with firewalls from Palo Alto Networks should make sure the devices are fully patched and the management...
New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution
Cybersecurity researchers have disclosed a new type of name confusion attack called whoAMI that allows anyone who publishes...
Lazarus Group Deploys Marstech1 JavaScript Implant in Targeted Developer Attacks
The North Korean threat actor known as the Lazarus Group has been linked to a previously undocumented JavaScript...
Optimizing Qwen2.5-Coder Throughput with NVIDIA TensorRT-LLM Lookahead Decoding
Large language models (LLMs) that specialize in coding have been steadily adopted into developer workflows. From pair programming...
SonicWall firewall bug leveraged in attacks after PoC exploit release
Attackers are now targeting an authentication bypass vulnerability affecting SonicWall firewalls shortly after the release of proof-of-concept (PoC)...
SonicWall firewall bug targeted in attacks after PoC exploit release
Attackers are now targeting an authentication bypass vulnerability affecting SonicWall firewalls shortly after the release of proof-of-concept (PoC)...
AWS Lambda adds application performance monitoring (APM) for Java and .NET runtimes via Application Signals
AWS Lambda now supports Amazon CloudWatch Application Signals, an application performance monitoring (APM) solution, for Java and .NET...
Amazon Q Developer now supports upgrade to Java 21
Amazon Q Developer transformation capabilities that allow customers to upgrade Java applications using Maven to Java 21 are...
Amazon Inspector enhances the security engine for container images scanning
Today, Amazon Inspector announced an upgrade to the engine powering its container image scanning for Amazon Elastic Container...
AWS CloudTrail network activity events for VPC endpoints are now generally available
With the launch of AWS CloudTrail network activity for VPC endpoints, you now have additional visibility into AWS...
Amazon EC2 C7g instances are now available in the AWS Europe (Zurich) Region
Starting today, Amazon Elastic Compute Cloud (Amazon EC2) C7g instances are available in the AWS Europe (Zurich) Region....
PirateFi game on Steam caught installing password-stealing malware
A free-to-play game named PirateFi in the Steam store has been distributing the Vidar infostealing malware to unsuspecting...
Malicious PirateFi game infects Steam users with Vidar malware
A free-to-play game named PirateFi in the Steam store has been distributing the Vidar infostealing malware to unsuspecting...
Nvidia forges healthcare partnerships to advance AI-driven genomics, drug discovery and more
Healthcare has the most significant upside, particularly in patient care, among all the industries applicable to AI. The...
Juniper CEO: ‘I am disappointed and somewhat puzzled’ by DOJ merger rejection
Few would have predicted the U.S. Department of Justice would move to block HPE’s proposed acquisition of Juniper...
PostgreSQL flaw exploited as zero-day in BeyondTrust breach
Rapid7’s vulnerability research team says attackers exploited a PostgreSQL security flaw as a zero-day to breach the network...
Searching for the cause of hung tasks in the Linux kernel
Depending on your configuration, the Linux kernel can produce a hung task warning message in its log. Searching...