2024-12-10
- AWS-LC FIPS 3.0: First cryptographic library to include ML-KEM in FIPS 140-3 validation >_
- Amazon Q Developer Tips: No.10 Personalise Amazon Qs output >_
- Announcing Trento Version 2.4 >_
- Authentication Isn’t Everything >_
- Automate actions across enterprise applications using Amazon Q Business plugins >_
- Automating with GitLab Duo, Part 2: Complex testing >_
- Bot Reporting: 4 Key Differences to Consider >_
- CISA listed Over 270 Critical Vulnerabilities Were Fixed Last Week – What’s New! >_
- Chinese Hackers Using Visual Studio Code Tunnels & RDP To Gain Remote Access >_
- Cleo Zero-Day RCE Vulnerability Actively Exploited in the Wild >_
- Cloud CISO Perspectives: Our 2025 Cybersecurity Forecast report >_
- Critical Vulnerability in Python Affected MacOS or Linux Leads to Exploiting The Memory >_
- DefectDojo Adds Ability to Normalize DevSecOps Data to ASPM Platform - DevOps.com >_
- Dell Power Manager Vulnerability Let Attackers Execute Malicious Code >_
- DevSecOps Transformation: Karthikeyan Ramdasss Enterprise Security Initiative - Free Press Journal >_
- Enforcing your robots.txt policies and stopping bots before they reach your website >_
- Geocoding: The first step towards unlocking location intelligence >_
- Google Cloud and Swift pioneer advanced AI and federated learning tech to help combat payments fraud >_
- Google Cloud expands vulnerability detection for Artifact Registry using OSV >_
- Happy circle-back season, to those who celebrate >_
- How To Advance Container Network Security in Kubernetes >_
- How To Check Broken Image Urls In The New Blog Posts >_
- How Vertex AI’s vector search helps unlock high-performance gen AI apps >_
- How to Dockerize a React App: A Step-by-Step Guide for Developers >_
- How to Get Useful Information Out of Valkey/Redis Keys >_
- How to deploy a PHP app using GitLab's Cloud Run integration >_
- How to package Go applications in RHEL 10 >_
- How to test Kubernetes autoscaling >_
- How using Availability Zones can eat up your budget — our journey from Prometheus to… >_
- Improve your security posture with expanded Custom Org Policy >_
- Inside Facebook’s video delivery system >_
- Introducing an enhanced version of the AWS Secrets Manager transform: AWS::SecretsManager-2024-09-16 >_
- Jay-Ann Lopez, founder of Black Girl Gamers, on creating safe spaces in gaming >_
- Learn to Install Oracle VirtualBox and Run Virtual Machines >_
- Let’s Encrypt to End Support for Online Certificate Status Protocol (OCSP) >_
- Linux on Arm (aarch64) servers: Can they handle datacenter-level networks? >_
- Looking back on a year of deeper connectivity across Earth Engine and Cloud >_
- Managing Data Corruption in the Cloud >_
- Manjaro 24.2 Yonada refines the desktop experience further >_
- Mastering the BMST: Effective Strategies for Success >_
- Microsoft 365 Down: Web Apps and Admin Center are Affected >_
- Microsoft December 2024 Patch Tuesday – 71 Vulnerabilities Fixed, Including 1 Zero-day & 30 RCEs >_
- Mozilla welcomes New Executive Team Members >_
- My Debian Activities in November 2024 >_
- MySQL Security Checks: A Comprehensive Guide to Protect Your Database >_
- Network Performance Decoded: A brief look at performance limiters >_
- New Black Duck Research Finds Majority of DevSecOps Teams Not Confident About Securing AI-Generated Code - The Eastern Progress Online >_
- New Meeten Malware Targets macOS and Windows Users to Steal Login Credentials >_
- Novel Uses of Core Java for Low-Latency and High-Performance Systems >_
- Pixtral 12B is now available on Amazon SageMaker JumpStart >_
- Python Logging with Structlog: A Comprehensive Guide >_
- Radiant Hacked – $50 Million USD Worth Crypto Stolen by North Korean Hackers >_
- RedLine Malware Weaponizing Pirated Corporate Softwares To Steal Logins >_
- Romania’s Leading Energy Provider Electrica Group Hit by Ransomware Attack >_
- SAP NetWeaver Vulnerabilities Let Attackers Upload Malicious PDF Files >_
- SUSE® Linux Enterprise Server 16: Shaping the Future of Enterprise IT >_
- Save the date: GrafanaCON 2025 is coming to Seattle in May! >_
- Simplifying SingleStore Integration Through Drizzle ORM >_
- Strengthen code security with signed commits >_
- Talk to your slide deck using multimodal foundation models on Amazon Bedrock – Part 3 >_
- The Edge Computing Revolution: How Telecom Providers Can Future-Proof Their Infrastructure >_
- This Week in Spring - December 10th, 2024 >_
- Uncovering Attacker’s Infrastructre & Tactics Via Passive DNS >_
- Unleash a new era of PostgreSQL: AlloyDB redefines what's possible >_
- What's missing from Go's generics? >_
- WhatsApp View Once Vulnerability Let Attackers Bypass The Privacy Feature >_
- Windows Common Log File System Zero-day (CVE-2024-49138) Exploited in the Wild >_
- systemctl logs: A Guide to Managing Logs in Linux >_