2024-12-25

  • AWS Outlines Its Post-Quantum Cryptography Migration Plan >_
  • Apache Traffic Control Vulnerability Let Attackers Inject Malicious SQL Commands >_
  • Azure Boost DPU: Microsoft's New Silicon Solution for Enhanced Cloud Performance >_
  • How to Use Docker Compose in Ansible >_
  • How to Use Emacs as a Desktop Environment in Linux with EXWM >_
  • How to Use awk to Perform Arithmetic Operations in Loops >_
  • How to Use sed for Dynamic Number Replacement in Linux >_
  • Multi-Cloud: A Strategy or a Headache? >_
  • Optimizing Your Linux Shell Experience >_
  • PHP 8.x: Exploring JIT Compilation and Performance Boosts >_
  • Ruby 3.4.0 Released >_

2024-12-24

  • Adobe ColdFusion Vulnerability Let Attackers Read arbitrary files – PoC Released >_
  • Amazon Q Developer Tips: No.24 Amazon Q Developer community resources >_
  • Apache HugeGraph-Server Vulnerability Lets Attackers Bypass Authentication >_
  • Best of 2024: AI Emerges as Next Major Kubernetes Challenge >_
  • Brazilian Hacker Charged for Selling Data Stolen From Hacked Computers >_
  • DevSecOps Market is Booming Worldwide with Players: Microsoft, Google, CA Technologies - openPR >_
  • FIFO Queue Support in Spring Cloud AWS >_
  • Hackers Deploy AsyncRAT and SectopRAT Using ScreenConnect Software on Windows >_
  • How to Append a Line After a String in a File Using sed Command >_
  • How to Scan for IP Addresses on Your Network with Linux >_
  • How to Set Up an AI Development Environment on Ubuntu >_
  • How to expand encrypted disk on Ubuntu >_
  • Integrating OpenTelemetry with Elixir: A Step-by-Step Guide >_
  • Linux 6.14 Looks To Land Rust PCI / Platform Device Driver Support >_
  • Node.js “systeminformation” Vulnerability Exposes Millions of Systems to RCE Attacks >_
  • OilRig Hackers Exploiting Windows Kernel 0-day to Attack Organizations >_
  • PEFT fine tuning of Llama 3 on SageMaker HyperPod with AWS Trainium >_
  • Securely Connect to a Remote MySQL Database Over SSH in Java >_
  • The Basics of Network Device Monitoring Explained >_
  • The Role of OpenTelemetry Events in Improving Observability >_
  • Two New Malicious PyPI Packages Attacking Users to Steal Login Details >_
  • Un experimento rápido: translating Cloudflare Stream captions with Workers AI >_
  • Webmin RCE Vulnerability Let Attackers Execute Arbitrary Code & Gain Server Control >_
  • When the world logs off: Christmas, New Year’s, and the Internet’s holiday rhythm >_

2024-12-23

  • 10 Best Linux Firewalls In 2025 >_
  • Amazon Q Developer Tips: No.22 Amazon Q Keyboard shortcuts >_
  • Amazon Q Developer Tips: No.23 Debugging with Amazon Q >_
  • Cloud CISO Perspectives: From gen AI to threat intelligence: 2024 in review >_
  • Comparison of test_decoding and pglogical plugins in Amazon Aurora PostgreSQL for data migration using AWS DMS >_
  • Critical SHARP Routers Vulnerabilities Lets Attacker Trigger RCE to Gain Root Access >_
  • Enhance the reliability of airlines’ mission-critical baggage handling using Amazon DynamoDB >_
  • Enhancing performance of Amazon RDS for Oracle with NVMe SSD hosted Smart Flash Cache and Temporary Tablespaces >_
  • Gemini 2.0: Level Up Your Apps with Real-Time Multimodal Interactions >_
  • Global elections in 2024: Internet traffic and cyber threat trends >_
  • Google is a Leader, positioned furthest in vision in the 2024 Gartner Magic Quadrant for Cloud Database Management Systems >_
  • Grinch Bots strike again: defending your holidays from cyber threats >_
  • IBM Cognos Analytics Vulnerability Allows Malicious File Upload & Injection Attacks >_
  • Improving Retrieval Augmented Generation accuracy with GraphRAG >_
  • Italy Imposed EUR 15 million Fine to Open AI For Violating GDPR >_
  • New G-Door Vulnerability Lets Hackers Bypass Microsoft 365 Security With Google Docs >_
  • OpenTelemetry Context Propagation for Better Tracing >_
  • PHP-based Craft CMS Vulnerability Let Attackers Execute Remote Code >_
  • Reflections on a Tumultuous 2024: How Cybersecurity and DevSecOps Took Center Stage - Security Boulevard >_
  • Researchers Bypass WPA3 to Acquire Network Password via Man-in-the-Middle Attack & Social Engineering >_
  • See the Similarity: Personalizing Visual Search with Multimodal Embeddings >_
  • The Model Context Protocol: Simplifying Building AI apps with Anthropic Claude Desktop and Docker >_
  • Threat Actors Exploiting Microsoft Office Vulnerability to Execute Malicious Code >_
  • U.S Intelligence Agencies Launched Cyber Attack on Chinese Tech Companies >_
  • Understanding Buckets in Prometheus: A Comprehensive Guide with Real-Time Examples >_
  • Using transcription confidence scores to improve slot filling in Amazon Lex >_
  • Why You Need Server Monitoring Tools and How to Choose >_
  • gRPC with OpenTelemetry: Observability Guide for Microservices >_

2024-12-22

  • Arch Linux Based CachyOS Takes The Lead On Intel Arrow Lake >_
  • Beginning Azure DevOps – Planning, Building, Testing, and Releasing Software Applications on Azure >_
  • Cathay Creates a New Generation of Security Champions with DevSecOps Transformation - South China Morning Post >_
  • Configuring SSL certificates on the Wazuh dashboard using Letsecrypt and NGINX >_
  • How to Install Safari on Linux >_
  • How to Make a Bash Script Wait for a Command to Finish >_
  • Liquorix vs. Linux 6.12 Upstream Kernel Performance Across Many Workloads >_
  • Real Python: A Practical Introduction to Web Scraping in Python >_
  • Terraform Data Sources: Implicit Dependencies and How to Avoid Them >_

2024-12-21

  • A Deep Dive into a Dockerized Log Server with Nginx and ELK >_
  • AIOpsLab: Building AI agents for autonomous clouds >_
  • Announcing Oracle WebLogic Server 14.1.2 >_
  • Authorities Arrested LockBit Ransomware Developer & Team Core Member >_
  • Boost Your Productivity with awscurl: Simplifying IAM-Secured API Testing in AWS >_
  • Critical PHP Zero-Day Vulnerability in Craft CMS Lets Hackers Gain Remote Access >_
  • Debian-Based Grml 2024.12 Linux Distro Is Out with Support for 64-Bit ARM CPUs >_
  • How to implement an AIOps strategy at scale >_
  • Introduction to AutoMQ: A Cost-Effective Kafka Alternative >_
  • Mastercard Completes Acquisition of Cybersecurity Firm Recorded Future for $2.6 Billion >_
  • McDonald’s Delivery App Vulnerability Let Anyone Place an Order for $0.01 >_
  • Mirror Your Android Screen on Linux With This Free Tool >_
  • Performance Optimization for Django-Powered Websites on Shared Hosting >_
  • Researchers Exploit Reflected Input with HTTP Range Header To Bypass Browser Restriction >_
  • Serverless semantic search - AWS Lambda, AWS Bedrock, Neon >_
  • Vuls: A Free, Open Source Vulnerability Scanner for Linux >_
  • What does the apt update Command Do? >_

2024-12-20

  • A Linux Moment: Why It Matters to Non-Techies >_
  • Beyond English: How Gemma open models are bridging the language gap >_
  • Bring multimodal real-time interaction to your AI applications with Cloudflare Calls >_
  • Calling all devs: Code the future of baseball with Google Cloud and MLB >_
  • Critical Sophos Firewall Vulnerabilities Let Attckers Execute Remote Code >_
  • Database Center: Now with support for Bigtable, Firestore, and Memorystore >_
  • Detect malicious activity in Google Workspace apps with Datadog Cloud SIEM >_
  • Foxit PDF Editor/Reader Vulnerabilities Let Attackers Execute Remote Code >_
  • Hackers Selling Cracked Version of Acunetix Tool as Araneida Scanner >_
  • Hi Claude, build an MCP server on Cloudflare Workers >_
  • How to support a growing Kubernetes cluster with a small etcd >_
  • Introducing Configurable Metaflow >_
  • Kafka with OpenTelemetry: Distributed Tracing Guide >_
  • Kubernetes 1.32 is now available on GKE >_
  • Lightweight container orchestration in SUSE Linux Micro >_
  • Major Enhancements to Akamai API Security, Q4 2024 >_
  • Malicious Apps On Amazon Appstore Records Screen & Intercept OTP’s >_
  • MySQL Transaction ERROR 1412 and Isolation Levels >_
  • NetWalker Ransomware Operator Sentenced For Hacking Hundreds Of Organizations >_
  • New “NotLockBit” Ransomware Attack Windows and macOS >_
  • OpenTelemetry with Flask: A Comprehensive Guide for Web Apps >_
  • OpenTelemetry: past, present, and future >_
  • Protecting Unmanaged Devices with Armis and Akamai >_
  • Python Morsels: Merging dictionaries in Python >_
  • Recipe for Efficient Development: Simplify Collaboration and Security with Docker >_
  • Siemens UMC Vulnerability Let Remote Attacker Execute Arbitrary Code >_
  • Spanner in 2024: A year of innovation >_
  • Strengthen LLMs with Sysdig Secure  >_
  • Strengthening Docker Security: Best Practices for Resilient Containers >_
  • Sublime Text 4 Code Editor Update 4186 Boosts Performance >_
  • Tailscale crossword: Any port in a storm >_
  • The Time Zone Database Package (tzdata) review for 2024 >_
  • The enterprising employee’s guide to “boomeranging” >_
  • Top 3 Open Source Virtual Data Room (VDR) for Linux >_
  • Top 5 Firebase Alternatives for 2024: Best Picks >_
  • Session Smart Routers With Default Passwords Hacked By Mirai Malware >_

2024-12-19

  • 2024 ISO and CSA STAR certificates now available with two additional services >_
  • A Complete Guide to Integrating OpenTelemetry with FastAPI >_
  • A different take on AI safety: A research agenda from the Columbia Convening on AI openness and safety >_
  • AVANT and Akamai: Solving Security Challenges for Financial Services >_
  • AWS completes the CCCS PBHVA assessment with 149 services and features in scope >_
  • Add a generative AI experience to your website or web application with Amazon Q embedded >_
  • Add more context to Cloud SIEM detections and investigations with Datadog Reference Tables >_
  • Amazon DynamoDB re:Invent 2024 recap >_
  • An introduction to preparing your own dataset for LLM training >_
  • Argo CD v2.14 Release Candidate >_
  • Autobase version 2.1.0 Released! >_
  • Basics of Pandas: 10 Core Commands for Data Analysis >_
  • BeyondTrust Remote Access & Support Flaw Enables Command Injection Attacks >_
  • Building Trust into Your Software with Verified Components >_
  • Building trust through transparency: A deep dive into the Anonym Transparency Portal >_
  • CERN PGDay 2025: Schedule Published >_
  • CISA Released National Cyber Incident Response Plan (NCIRP) – 2024 >_
  • CISA Urges Use of End-to-End Encrypted Messaging Services like Signal, Following U.S. Telecoms Hack >_
  • CISA Warns of 4 New Vulnerabilities Exploited in the Wild >_
  • Celebrating innovation: Gemini API Developer Competition >_
  • Criminals Abuse Microsoft Dynamics 365 to Steal User Credentials >_
  • Critical Chrome Vulnerabilities Allow Remote Code Execution, Update Now >_
  • December Tailscale newsletter >_
  • Design multi-agent orchestration with reasoning using Amazon Bedrock and open source frameworks >_
  • DigiEver Fix That IoT Thing! >_
  • Europol Reveals How Cyber Criminals Boost Economy By Hacking Legal Businesses >_
  • Fall 2024 SOC 1, 2, and 3 reports now available with 183 services in scope >_
  • Find sensitive data faster (but safely) with Google Distributed Cloud’s gen AI search solution >_
  • Fish Shell 4.0 Beta Introduces A Major Rewrite In Rust >_
  • Fortinet Vulnerabilities Let Attackers Execute Arbitrary Code Remotely >_
  • Gain confidence with hosted control planes and OpenShift Virtualization using public cloud >_
  • GitHub Copilot is now available for free >_
  • GitHub Launches “Copilot Free” Access to 150 Million Developers >_
  • Hackers Exploiting Azure Key Vault Access Policies To Read Sensitive Data >_
  • Hackers Exploiting FortiClient EMS Vulnerability (CVE-2023-48788) in the Wild >_
  • Half My Life with Perl >_
  • Hikvision Camera Driver Vulnerability Records Login details in Log files >_
  • How Google Cloud can help customers achieve compliance with NIS2 >_
  • How Lavazza modernized digital processes and connected IT & business teams >_
  • How to Check SSD Health in Linux >_
  • How to Use dnf5 Command for Fedora Package Management >_
  • How to build hosted clusters on the OpenStack platform >_
  • How to disable swap at boot using systemd >_
  • Implementing Raft: Part 5 - exactly-once delivery >_
  • Indexing code at scale with Glean >_
  • Inside Grafana Labs: how we foster a culture of continuous learning >_
  • Introducing Droplet Autoscale Pools: Seamless Scaling for Your Workloads >_
  • Kindo Unveils Exciting New Channel Partner Program for AI-Powered DevSecOps Solutions - Channel Insider >_
  • Last Week in Kubernetes Development - Week Ending December 15 2024 >_
  • Linux Syslog Explained: Configuration and Tips >_
  • Local AI and Confluence >_
  • MongoDB Atlas Integration with Ably Unlocks Real-time Capabilities >_
  • MySQL Telemetry: OpenTelemetry Logging >_
  • NetBSD 10.1 available! >_
  • New Phishing Attack Exploiting HubSpot Tools To Steal Microsoft Azure Logins >_
  • Next.js Authorization Bypass Vulnerability Exposes Root-Level Pages >_
  • OpenBGPD 8.7 released >_
  • Percona Wins 2024 Digital Innovator Award from Intellyx >_
  • Percona XtraBackup 101: Decompress and Decrypt or Decrypt and Decompress? >_
  • Private AI for the Enterprise: Where Data Security Meets Innovation >_
  • Raccoon Infostealer Admin Arrested for Hacking Computers >_
  • Rails unveils some official merch >_
  • Real Python: Get Started With Django User Management >_
  • ScyllaDB – Why We're Moving to a Source Available License >_
  • Stable Diffusion 3.5 Large is now available in Amazon Bedrock >_
  • The Real Beauty of Business: Beyond the Surface by Constant Fischer >_
  • The role of email security in reducing user risk amid rising threats >_
  • Transition from AWS DMS to zero-ETL to simplify real-time data integration with Amazon Redshift >_
  • Updated PCI DSS and PCI PIN compliance packages now available >_
  • What’s new for Google Cloud databases — December 2024 >_
  • Why Cloud Security Monitoring is Crucial for Your Business >_
  • Xfce 4.20 Released; Learn what’s new in this release >_
  • pgmoneta 0.15 >_
« newer articles | page 70 | older articles »