2024-12-10

  • AWS-LC FIPS 3.0: First cryptographic library to include ML-KEM in FIPS 140-3 validation >_
  • Amazon Q Developer Tips: No.10 Personalise Amazon Qs output >_
  • Announcing Trento Version 2.4 >_
  • Authentication Isn’t Everything >_
  • Automate actions across enterprise applications using Amazon Q Business plugins >_
  • Automating with GitLab Duo, Part 2: Complex testing >_
  • Bot Reporting: 4 Key Differences to Consider >_
  • CISA listed Over 270 Critical Vulnerabilities Were Fixed Last Week – What’s New! >_
  • Chinese Hackers Using Visual Studio Code Tunnels & RDP To Gain Remote Access >_
  • Cleo Zero-Day RCE Vulnerability Actively Exploited in the Wild >_
  • Cloud CISO Perspectives: Our 2025 Cybersecurity Forecast report >_
  • Critical Vulnerability in Python Affected MacOS or Linux Leads to Exploiting The Memory >_
  • DefectDojo Adds Ability to Normalize DevSecOps Data to ASPM Platform - DevOps.com >_
  • Dell Power Manager Vulnerability Let Attackers Execute Malicious Code >_
  • DevSecOps Transformation: Karthikeyan Ramdasss Enterprise Security Initiative - Free Press Journal >_
  • Enforcing your robots.txt policies and stopping bots before they reach your website >_
  • Geocoding: The first step towards unlocking location intelligence >_
  • Google Cloud and Swift pioneer advanced AI and federated learning tech to help combat payments fraud >_
  • Google Cloud expands vulnerability detection for Artifact Registry using OSV >_
  • Happy circle-back season, to those who celebrate >_
  • How To Advance Container Network Security in Kubernetes >_
  • How To Check Broken Image Urls In The New Blog Posts >_
  • How Vertex AI’s vector search helps unlock high-performance gen AI apps >_
  • How to Dockerize a React App: A Step-by-Step Guide for Developers >_
  • How to Get Useful Information Out of Valkey/Redis Keys >_
  • How to deploy a PHP app using GitLab's Cloud Run integration >_
  • How to package Go applications in RHEL 10 >_
  • How to test Kubernetes autoscaling >_
  • How using Availability Zones can eat up your budget — our journey from Prometheus to… >_
  • Improve your security posture with expanded Custom Org Policy >_
  • Inside Facebook’s video delivery system >_
  • Introducing an enhanced version of the AWS Secrets Manager transform: AWS::SecretsManager-2024-09-16 >_
  • Jay-Ann Lopez, founder of Black Girl Gamers, on creating safe spaces in gaming >_
  • Learn to Install Oracle VirtualBox and Run Virtual Machines >_
  • Let’s Encrypt to End Support for Online Certificate Status Protocol (OCSP) >_
  • Linux on Arm (aarch64) servers: Can they handle datacenter-level networks? >_
  • Looking back on a year of deeper connectivity across Earth Engine and Cloud >_
  • Managing Data Corruption in the Cloud >_
  • Manjaro 24.2 Yonada refines the desktop experience further >_
  • Mastering the BMST: Effective Strategies for Success >_
  • Microsoft 365 Down: Web Apps and Admin Center are Affected >_
  • Microsoft December 2024 Patch Tuesday – 71 Vulnerabilities Fixed, Including 1 Zero-day & 30 RCEs >_
  • Mozilla welcomes New Executive Team Members >_
  • My Debian Activities in November 2024 >_
  • MySQL Security Checks: A Comprehensive Guide to Protect Your Database >_
  • Network Performance Decoded: A brief look at performance limiters >_
  • New Black Duck Research Finds Majority of DevSecOps Teams Not Confident About Securing AI-Generated Code - The Eastern Progress Online >_
  • New Meeten Malware Targets macOS and Windows Users to Steal Login Credentials >_
  • Novel Uses of Core Java for Low-Latency and High-Performance Systems >_
  • Pixtral 12B is now available on Amazon SageMaker JumpStart >_
  • Python Logging with Structlog: A Comprehensive Guide >_
  • Radiant Hacked – $50 Million USD Worth Crypto Stolen by North Korean Hackers >_
  • RedLine Malware Weaponizing Pirated Corporate Softwares To Steal Logins >_
  • Romania’s Leading Energy Provider Electrica Group Hit by Ransomware Attack >_
  • SAP NetWeaver Vulnerabilities Let Attackers Upload Malicious PDF Files >_
  • SUSE® Linux Enterprise Server 16: Shaping the Future of Enterprise IT >_
  • Save the date: GrafanaCON 2025 is coming to Seattle in May! >_
  • Simplifying SingleStore Integration Through Drizzle ORM >_
  • Strengthen code security with signed commits >_
  • Talk to your slide deck using multimodal foundation models on Amazon Bedrock – Part 3 >_
  • The Edge Computing Revolution: How Telecom Providers Can Future-Proof Their Infrastructure >_
  • This Week in Spring - December 10th, 2024 >_
  • Uncovering Attacker’s Infrastructre & Tactics Via Passive DNS >_
  • Unleash a new era of PostgreSQL: AlloyDB redefines what's possible >_
  • What's missing from Go's generics? >_
  • WhatsApp View Once Vulnerability Let Attackers Bypass The Privacy Feature >_
  • Windows Common Log File System Zero-day (CVE-2024-49138) Exploited in the Wild >_
  • systemctl logs: A Guide to Managing Logs in Linux >_