2024-11-11

  • 6 Effective Steps to Accelerate Cybersecurity Incident Response >_
  • A new flexible DNS-based approach for accessing the GKE control plane >_
  • AWS Weekly Roundup: 20 years of AWS News Blog, Express brokers for Amazon MSK, Windows Server 2025 images on EC2, and more (Nov 11, 2024) >_
  • Build and deploy image mode for RHEL on OpenShift Virtualization >_
  • Building a GDPR compliance solution with Amazon DynamoDB >_
  • CachyOS ISO Release for November Improves Support for AMD and NVIDIA Users >_
  • Capture and diagnose I/O bottlenecks on Amazon RDS for SQL Server >_
  • Dataplex Automatic Discovery makes Cloud Storage data available for Analytics and governance >_
  • Debian 12.8 “Bookworm” Released with 68 Bug Fixes and 50 Security Updates >_
  • DeltaPrime Exploited, Hackers Stolen $4.8M Worth of ARB and AVAX Tokens >_
  • Discover insights with the Amazon Q Business Microsoft Teams connector >_
  • Epson Devices Vulnerability Let Attackers Create Rogue Admin Accounts >_
  • Fine-tune Meta Llama 3.2 text generation models for generative AI inference using Amazon SageMaker JumpStart >_
  • Flask Logging Made Simple for Developers >_
  • From Chaos to Clarity: Mastering Alerting Policy Documentation >_
  • Go Turns 15 >_
  • Google Cloud deepens its commitment to security and transparency with expanded CVE program >_
  • Gootloader Malware Targets Bengal Cat Lovers By Poisoning Google Search Results >_
  • Hackers Abusing Google Ads To Deliver Fakebat Malware >_
  • Hackers Attacking Windows Users With Weaponized Excel Documents To Deliver Remcos RAT >_
  • Hackers Exploiting Veeam RCE Flaw to Deploy New Frag Ransomware >_
  • HardenEKS: The Easy Way to keep your AWS EKS clusters secure and compliant >_
  • Heterogenous data sources: Access your data in PostgreSQL from Amazon RDS for Oracle using Oracle Database Gateway >_
  • How Verve achieves 37% performance gains with C4 machines and new GKE features >_
  • How an insurance company implements disaster recovery of 3-tier applications >_
  • How to Accelerate Cloud Migrations at Scale >_
  • How to Generate and Verify Files with MD5 Checksum in Linux >_
  • How to Register and Activate Red Hat Subscription for RHEL 9 >_
  • How to Update PostgreSQL Server Configurations Without Downtime >_
  • How to build custom nodes workflow with ComfyUI on Amazon EKS >_
  • Linux 6.12-rc7 Released: Linux 6.12 Stable On Track For Release Next Sunday >_
  • Maximize your cloud security experience at AWS re:Invent 2024: A comprehensive guide to security sessions >_
  • Measure and optimize security team efficiency with Cloud SIEM security operational metrics >_
  • Microsoft Bookings Flaw Let Hackers Create Impersonate User Acccounts >_
  • Monitor Azure AI Search with Datadog >_
  • Monitor your Cisco Umbrella network logs with Datadog Cloud SIEM >_
  • Must-Attend Talks and Activities at KubeCon 2024 >_
  • Palo Alto Networks Warns Of Critical PAN-OS Remote Code Execution Vulnerability >_
  • Python OOP Cheat Sheet: From Novice to Pro in No Time >_
  • Ransomware Works And Is Here To Stay >_
  • Roblox Developers Under Attack Via Weaponized npm Packages >_
  • Robust Intelligence, Now Part of Cisco, Recognized as a 2024 Gartner® Cool Vendor™ for AI Security >_
  • SRE Checklist for AWS Lambda >_
  • Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace >_
  • Transforming Location Retrieval at Airbnb: A Journey from Heuristics to Reinforcement Learning >_
  • Troubleshoot and resolve pod issues easily with Kubernetes Active Remediation >_
  • Understanding Docker Logs: A Quick Guide for Developers >_
  • Working with images in Laravel using intervention/image >_
  • pgvector 0.8.0 Released! >_

2024-11-10

  • CloudFormation template generator with LLMs/GenAI >_
  • Google Axion CPU With GCE C4A vs. AWS Graviton4 Performance >_
  • Guide to Passing GitLab Artifacts to Another Stage >_
  • How Amazon Q Stands Out: A Comparison with Microsoft Copilot and Google Gemini >_
  • How to Start, Stop, and Restart Services in Linux >_
  • How to Test Network (ethernet) Speed on Linux CLI with iperf3 >_
  • Malicious PyPI package with 37,000 downloads steals AWS keys >_
  • Quickly Set Up a GraphQL API for DynamoDB CRUD operations with Just a Few Clicks Using AWS AppSync >_
  • Uptime Kuma Docker Setup Guide: Installation and Configuration >_

2024-11-09

  • A Decade of AWS Lambda and ECS: My Journey of Growth and Gratitude >_
  • Efficient MySQL Performance In 10 Sentences >_
  • Flare-On 11 Challenge Solutions >_
  • FreeBSD 14.2-BETA2 Available >_
  • How to Host a Website on AWS EC2 Using a CSS Template >_
  • How to Install and Use Vuls Vulnerability Scanner on Ubuntu 24.04 >_
  • Integrated AWS Workflows with SageMaker Notebooks >_
  • Introduction to LocalStack, a Drop-In Replacement for AWS >_
  • New microblog with TILs >_
  • North Korean Hackers Abuse Cloud-Based Services to Deploy Malware >_
  • Optimizing Network Performance With Edge Computing for 5G Networks >_
  • Prevent EC2 Instance From Changing IP Address After Restart >_
  • The Most Potent Security Control on AWS >_
  • Why is ML Runtime Infra So Hard >_

2024-11-08

  • 6 insights to make your data AI-ready, with Accenture’s Teresa Tung >_
  • Amazon EKS now supports Amazon Application Recovery Controller >_
  • Announcing new APIs for Amazon Location Service Routes, Places, and Maps >_
  • Are your project management tools promoting collaboration or friction? >_
  • Best practices for running Apache Cassandra with Amazon EBS >_
  • Beware of Fake Copyright Claims That Deliver Rhadamanthys Stealer >_
  • Build & deploy JBoss EAP 8 images in OpenShift with Galleon & Helm charts >_
  • CISA Warns of Palo Alto & Android Vulnerabilities Exploited in Attacks >_
  • Converge Your WAN and Security With Cisco Firewall >_
  • Etsy’s Service Platform on Cloud Run cuts deployment time from days to under an hour >_
  • Finding Solutions to Meet PCI DSS v4.0 Requirements 6.4.3 and 11.6.1 >_
  • Gemini is now accessible from the OpenAI Library >_
  • Generative AI with enterprise controls for business users in 24 Hours >_
  • Google is a Leader in The Forrester Wave™: Translytical Data Platforms, Q4 2024 >_
  • Grafana release cycle: end-of-year update >_
  • How Edge Computing Optimizes Manufacturing Operations >_
  • How to Count Total Frames in a Video on Linux Using FFmpeg >_
  • How to Fix the Electoral College >_
  • How to Host a Website on AWS EC2 Using a CSS Template >_
  • How to Monitor MySQL or MariaDB with Prometheus and Grafana >_
  • How to Self-Host All of Bluesky >_
  • How to Set Semantic Versioning for .NET Core Apps and Libraries >_
  • How to Set Up WordPress Multisite with OpenLiteSpeed on Ubuntu 24.04 >_
  • How to Setup Apache Virtual Hosts in RHEL 9 >_
  • How to Use WebCurate to Discover Helpful Developer Tools >_
  • How to deploy and serve multi-host gen AI large open models over GKE >_
  • How to dual-boot Windows 11 and Linux on your PC >_
  • How to get verified on YouTube: a step-by-step guide for a complete channel experience >_
  • How to rename and retain the endpoint name for Amazon RDS >_
  • How to self-host all of Bluesky except the AppView (for now) >_
  • How to turn on comments on YouTube: Your simple guide for new videos >_
  • How we prevent conflicts in authoritative DNS configuration using formal verification >_
  • Know before you go: Amazon DynamoDB sessions at AWS re:Invent 2024 >_
  • Kubernetes v1.32 sneak peek >_
  • Lessons Learned from Migrating to Amazon Cognito >_
  • Leveraging Threat Intelligence in Cisco Secure Network Analytics, Part 2 >_
  • Monitor the cost of your public sector applications with Datadog Cloud Cost Management >_
  • New Feature: Amazon CloudFront no longer charges (No Billing) for requests blocked by AWS WAF >_
  • Threat Actors Attacking macOS Users With New Multi-stage Malware >_
  • Top 10 Kibana Alternatives [2024 Guide] >_
  • Troubleshooting RAG-based LLM applications >_
  • Unlocking the future: Azure networking updates on security, reliability, and high availability >_
  • Visualize real-time CAN-to-USB data via custom Grafana dashboards and the MQTT plugin >_
  • We asked why you love Firefox. Here’s what you said. >_

2024-11-07

  • 10 Essential Tips for AWS Exams: Common Pitfalls to Avoid and Some Jedi Wisdom >_
  • A look at the latest post-quantum signature standardization candidates >_
  • ANY.RUN Launched an Upgraded Linux Sandbox for Effective Malware Analysis >_
  • AWS Lambda: OCR and Text Translation in the AWS Cloud >_
  • Akamai's Behavioral DDoS Engine: A Breakthrough in Modern DDoS Mitigation >_
  • Amazon Bedrock Prompt Management is now available in GA >_
  • Atlassian X Figma: Unifying workflows across the product lifecycle >_
  • Build a multi-tenant generative AI environment for your enterprise on AWS >_
  • Cisco Identity Services Engine Flaw Bypass Authorization Mechanisms >_
  • Cisco Industrial Wireless Software Flaw Let Attackers Run Command As Root User >_
  • Cloud Migration: What, Why and Who Benefits >_
  • Cybersecurity Growth Stock to Buy During the Latest Market Sell-Off >_
  • Deploying AWS EKS with Terraform and Blueprints Addons >_
  • Deutsche Telekom designs the telco of tomorrow with BigQuery >_
  • Elevate network security and migrate your legacy VPC firewall rules to Cloud NGFW >_
  • Enhance customer support with Amazon Bedrock Agents by integrating enterprise data APIs >_
  • Essential AWS Security Services to Safeguard Your AWS Cloud Workloads >_
  • Getting started with NL2SQL (natural language to SQL) with Gemini and BigQuery >_
  • Google Summer of Code 2024 results >_
  • Hackers Abuse DocuSign API to Send Genuine Looking Invoices >_
  • Hackers Use ZIP File Concatenation Tactic to Launch Undetected Attacks on Windows Users >_
  • How Confluence Premium unlocks cross-functional workflows with Jira and Jira Service Management >_
  • How To Monitor Linux System Resource Usage Using Bottom >_
  • How Zalando optimized large-scale inference and streamlined ML operations on Amazon SageMaker >_
  • How to Achieve SOC-2 Compliance on AWS >_
  • How to Fix SSH Connection Refused Error >_
  • How to Fix ‘apt-get command not found’ Error >_
  • How to Install Mattermost on Rocky Linux 9 >_
  • How to Install NumPy in Python >_
  • How to Set Up AnyDesk Remote Desktop on Ubuntu >_
  • How to Set Up Automated GitHub Workflows for Your Python and React Applications >_
  • How to Solve It with Code >_
  • How to change the file owner and indirectly file group >_
  • How to simplify building RAG pipelines in BigQuery with Document AI Layout Parser >_
  • How to track file descriptors with Valgrind >_
  • How to work with multiple data sources in Grafana dashboards: best practices to get started >_
  • Improving deployment visibility for Amazon ECS services >_
  • Integrity in SUSE’s Partner Ecosystem: Building Trust Through Transparency and Open Source Values >_
  • Introducing Express brokers for Amazon MSK to deliver high throughput and faster scaling for your Kafka clusters >_
  • Multiple Vulnerabilities in HPE Aruba Access Points Let Attackers Execute Remote Code >_
  • NetSecOPEN: Cisco Firewall Outperforms Competition in Real-World Testing >_
  • New SteelFox Malware Infected 11,000+ Windows Systems Mimics Software Activators >_
  • North Korean Hackers Employing New Tactic To Acquire Remote Jobs >_
  • Now run your custom code at the edge with the Application Load Balancers >_
  • Pinning User-space Pages in the Linux Kernel: Exploring get_user_pages, pin_user_pages, and Page Table Walking >_
  • Protect your applications from zero-day attacks with Datadog Exploit Prevention >_
  • Reduce the amount of code in AWS CDK: Apply OAC in Amazon CloudFront L2 constructs >_
  • SCP Directory transfer in Linux: How to do it >_
  • Supercharging AI Coding Assistants with Gemini Models' Context >_
  • The Complete Guide to the MongoDB® $sum Operator >_
  • This one's for Jason Seifer >_
  • Tune Amazon RDS for Oracle CDBs with Amazon Performance Insights >_
  • Unleashing Stability AI’s most advanced text-to-image models for media, marketing and advertising: Revolutionizing creative workflows >_
  • Use bootc logically bound images to deploy a Kafka cluster >_
  • Using Leapp to Upgrade Systems Managed by OS Management Services >_
  • gccrs: An alternative compiler for Rust >_

2024-11-06

  • (In)tuned to Takeovers: Abusing Intune Permissions for Lateral Movement and Privilege Escalation in Entra ID Native Environments >_
  • 25 Boardroom Cybersecurity Facts, Figures, Predictions, and Statistics >_
  • Amazon DynamoDB data models for generative AI chatbots >_
  • An Elephant in the Cluster: Making PostgreSQL Feel at Home on Kubernetes >_
  • Announcing updates to the AWS Well-Architected Framework guidance >_
  • Azure API Management Flaws Let Attackers Take Full Control APIM Service >_
  • Build a scalable, context-aware chatbot with Amazon DynamoDB, Amazon Bedrock, and LangChain >_
  • Build and deploy a UI for your generative AI applications with AWS and Python >_
  • CAN MY AWS TECH ARTICLE BEAT CHATGPT? >_
  • CRON#TRAP Campaign Attacking Windows Machine With Weaponized Linux VMs >_
  • Channel deflection from voice to chat using Amazon Connect >_
  • Chrome Security Update: Patch for Multiple High Severity Vulnerabilities >_
  • Configure SAP services to log outsite of journald >_
  • Creating an AMI with Image Builder >_
  • Exploring Internet traffic shifts and cyber attacks during the 2024 US election >_
  • From static prediction to dynamic characterization: AI2BMD advances protein dynamics with ab initio accuracy >_
  • Get Plugged In: How to Use Generative AI Tools in Obsidian >_
  • Hacker Behind Snowflake Data Breach Arrested in Canada >_
  • HookBot Malware’s Overlay Attacks To Impersonate As Popular Brands >_
  • How Channel Corporation modernized their architecture with Amazon DynamoDB, Part 1: Motivation and approaches >_
  • How Channel Corporation modernized their architecture with Amazon DynamoDB, Part 2: Streams >_
  • How Infinitium reduced fraud detection time by 95% with Amazon ECS and AWS Fargate on AWS Graviton >_
  • How to Collaborate on PDF Files on Linux Using ONLYOFFICE Docs >_
  • How to Create an Organic Text Distortion Effect with Infinite Scrolling >_
  • How to Create and Use Symbolic Links (aka Symlinks) on Linux >_
  • How to Install a Desktop (GUI) on Ubuntu Server >_
  • How to Personalize Fedora Desktop with Themes and Extensions >_
  • How to Price MDR Services for Your Business: A Practical Guide >_
  • How to Reset a pandas DataFrame Index >_
  • How to Use LangChain and GPT to Analyze Multiple Documents >_
  • How to use virtual threads with ScheduledExecutorService >_
  • INTERPOL Takes Down 22,000 malicious IP addresses Used for Hacking >_
  • Integrate foundation models into your code with Amazon Bedrock >_
  • Introducing the last cohort of AWS Heroes this year – November 2024 >_
  • LameDuck’s Skynet Botnet Launched 35,000+ DDoS Attacks >_
  • Next Steps on the Rust Trademark Policy >_
  • Optimize Amazon Aurora PostgreSQL auto scaling performance with automated cache pre-warming >_
  • Practical usage of Sysdig OSS >_
  • Prometheus 3.0 and OpenTelemetry: a practical guide to storing and querying OTel data >_
  • Prometheus Pushgateway: How to Track Short-Lived Jobs >_
  • Rails Without Derails: Thwarting Code Injection Attacks >_
  • Simplifying cluster security: RHACS in RHACM global hub >_
  • Tailscale named in Deloitte’s Technology Fast 50 >_
  • The Reasons Authoritarianism Is Growing – and How to Reverse It >_
  • Unearth insights from audio transcripts generated by Amazon Transcribe using Amazon Bedrock >_
  • Unleash the power of generative AI with Amazon Q Business: How CCoEs can scale cloud governance best practices and drive innovation >_
  • What is Umask in Linux and how to use it effectively? >_

2024-11-05

  • AI Powers Cybercrime and Cybersecurity. Which Side Is Winning. >_
  • APT36 Group Attacking Windows Systems Absuing Google Drive & Slack >_
  • Adding runtime threat detection to Google Kubernetes Engine with Falco >_
  • Amazon Inspector suppression rules best practices for AWS Organizations >_
  • Android Zero-Day Vulnerabilities Actively Exploited In Attacks, Patch Now! >_
  • Asurion >_
  • Avoid Counting in Django Pagination >_
  • CISA Warns of PTZOptics Cameras Vulnerability Exploited to Escalate Privileges >_
  • ClickFix Leveraging GMeet & Zoom Pages To Deliver Infostealer Malware >_
  • Defining Python dependencies at the top of the file >_
  • Designing a successful modernization approach for AI readiness >_
  • Dockerize WordPress: Simplify Your Site’s Setup and Deployment >_
  • Grafana Labs at KubeCon: OpenTelemetry, Prometheus 3.0, eBPF, and more >_
  • Hackers Created 100+ Fake Web Stores To Steal Millions Of Dollars >_
  • How to Convert AI Tokens to Google Gemini Cost Estimates >_
  • How to Fine-Tune LLMs Without Being an AI Expert >_
  • How to Fuzz Test Golang HTTP Services >_
  • How to Integrate Tailwind with Django – With Code Examples >_
  • How to Launch an EC2 Instance and Set Up a Web Server Using HTTPD >_
  • How to Manage Multiple promises concurrently with Promise.all() >_
  • How to Secure Your Java Application with SSL Certificates for Java Keystore and AWS ALB >_
  • How to Use Syntax Highlighting in Nano Editor >_
  • How to Write Clean Code – Tips for Developers with Examples >_
  • How to determine when system was installed >_
  • How to know which user did reboot or shutdown when multiple desktop sessions are active? >_
  • Image mode for RHEL: 4 key use cases for streamlining your OS >_
  • Implement effective data authorization mechanisms to secure your data used in generative AI applications >_
  • Kubernetes Microservices: Key Concepts Explained >_
  • Let’s Architect! Modern data architectures >_
  • NAKIVO Backup & Replication: The Ultimate Solution to Protect Backups from Ransomware >_
  • Nokia Investigating Data Breach, IntelBroker Allegedly Selling Source Code >_
  • Personal Use of AWS Organizations Using CDK >_
  • RoCEv2 Congestion Counters Explained >_
  • Rockwell ThinManager Vulnerability Exposes Systems To DoS Condition >_
  • SUSE Recognized as a Leader in 5G Cloud-Native Platforms >_
  • Tools for writing secure Go code >_
  • Top Costly Cloud Mistakes — and How To Sidestep Them >_
  • ToxicPanda Banking Malware Attacking Banking Users To Steal Logins >_
  • Valkey/Redis Key-Specific Dump, Restore, and Migration >_
  • We’re leaving Kubernetes >_
  • Why Edge Computing Is Essential for IoT-Based Manufacturing >_
  • Windows Server 2025 now generally available, with advanced security, improved performance, and cloud agility >_
  • powa-collector 1.3.0 is out! >_
« newer articles | page 76 | older articles »