2024-11-06

  • (In)tuned to Takeovers: Abusing Intune Permissions for Lateral Movement and Privilege Escalation in Entra ID Native Environments >_
  • 25 Boardroom Cybersecurity Facts, Figures, Predictions, and Statistics >_
  • Amazon DynamoDB data models for generative AI chatbots >_
  • An Elephant in the Cluster: Making PostgreSQL Feel at Home on Kubernetes >_
  • Announcing updates to the AWS Well-Architected Framework guidance >_
  • Azure API Management Flaws Let Attackers Take Full Control APIM Service >_
  • Build a scalable, context-aware chatbot with Amazon DynamoDB, Amazon Bedrock, and LangChain >_
  • Build and deploy a UI for your generative AI applications with AWS and Python >_
  • CAN MY AWS TECH ARTICLE BEAT CHATGPT? >_
  • CRON#TRAP Campaign Attacking Windows Machine With Weaponized Linux VMs >_
  • Channel deflection from voice to chat using Amazon Connect >_
  • Chrome Security Update: Patch for Multiple High Severity Vulnerabilities >_
  • Configure SAP services to log outsite of journald >_
  • Creating an AMI with Image Builder >_
  • Exploring Internet traffic shifts and cyber attacks during the 2024 US election >_
  • From static prediction to dynamic characterization: AI2BMD advances protein dynamics with ab initio accuracy >_
  • Get Plugged In: How to Use Generative AI Tools in Obsidian >_
  • Hacker Behind Snowflake Data Breach Arrested in Canada >_
  • HookBot Malware’s Overlay Attacks To Impersonate As Popular Brands >_
  • How Channel Corporation modernized their architecture with Amazon DynamoDB, Part 1: Motivation and approaches >_
  • How Channel Corporation modernized their architecture with Amazon DynamoDB, Part 2: Streams >_
  • How Infinitium reduced fraud detection time by 95% with Amazon ECS and AWS Fargate on AWS Graviton >_
  • How to Collaborate on PDF Files on Linux Using ONLYOFFICE Docs >_
  • How to Create an Organic Text Distortion Effect with Infinite Scrolling >_
  • How to Create and Use Symbolic Links (aka Symlinks) on Linux >_
  • How to Install a Desktop (GUI) on Ubuntu Server >_
  • How to Personalize Fedora Desktop with Themes and Extensions >_
  • How to Price MDR Services for Your Business: A Practical Guide >_
  • How to Reset a pandas DataFrame Index >_
  • How to Use LangChain and GPT to Analyze Multiple Documents >_
  • How to use virtual threads with ScheduledExecutorService >_
  • INTERPOL Takes Down 22,000 malicious IP addresses Used for Hacking >_
  • Integrate foundation models into your code with Amazon Bedrock >_
  • Introducing the last cohort of AWS Heroes this year – November 2024 >_
  • LameDuck’s Skynet Botnet Launched 35,000+ DDoS Attacks >_
  • Next Steps on the Rust Trademark Policy >_
  • Optimize Amazon Aurora PostgreSQL auto scaling performance with automated cache pre-warming >_
  • Practical usage of Sysdig OSS >_
  • Prometheus 3.0 and OpenTelemetry: a practical guide to storing and querying OTel data >_
  • Prometheus Pushgateway: How to Track Short-Lived Jobs >_
  • Rails Without Derails: Thwarting Code Injection Attacks >_
  • Simplifying cluster security: RHACS in RHACM global hub >_
  • Tailscale named in Deloitte’s Technology Fast 50 >_
  • The Reasons Authoritarianism Is Growing – and How to Reverse It >_
  • Unearth insights from audio transcripts generated by Amazon Transcribe using Amazon Bedrock >_
  • Unleash the power of generative AI with Amazon Q Business: How CCoEs can scale cloud governance best practices and drive innovation >_
  • What is Umask in Linux and how to use it effectively? >_