Security::Relay
updated: 11/29/2024, 15:10:15 |
sort
Google launches a regular scams and fraud advisory
( Subscribe to Security Magazine's RSS Feed )
|
The Global Surveillance Free-for-All in Mobile Ad Data
( Krebs on Security )
|
Updated whitepaper: Architecting for PCI DSS Segmentation and Scoping on AWS
( AWS Security Blog )
|
Securing the RAG ingestion pipeline: Filtering mechanisms
( AWS Security Blog )
|
Understanding and applying the zero trust mentality
( Subscribe to Security Magazine's RSS Feed )
|
Outsmart disaster: Learning from world events and navigating evacuations
( Subscribe to Security Magazine's RSS Feed )
|
North Korea Cyber Group Conducts Global Espionage Campaign to Advance Regime’s Military and Nuclear Programs
( CISA Cybersecurity Advisories )
|
Navigating the regulatory and compliance landscape of 2025
( Subscribe to Security Magazine's RSS Feed )
|
How to mitigate bot traffic by implementing Challenge actions in your AWS WAF custom rules
( AWS Security Blog )
|
Exploring digital sovereignty: learning opportunities at re:Invent 2024
( AWS Security Blog )
|
Hacker in Snowflake Extortions May Be a U.S. Soldier
( Krebs on Security )
|
Notable physical security trends of 2024
( Subscribe to Security Magazine's RSS Feed )
|
Canadian Man Arrested in Snowflake Data Extortions
( Krebs on Security )
|
Amazon Inspector suppression rules best practices for AWS Organizations
( AWS Security Blog )
|
Exploring the benefits of artificial intelligence while maintaining digital sovereignty
( AWS Security Blog )
|
Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a US Critical Infrastructure Sector Organization
( CISA Cybersecurity Advisories )
|
New AWS Secure Builder training available through SANS Institute
( AWS Security Blog )
|
Feds Charge Five Men in ‘Scattered Spider’ Roundup
( Krebs on Security )
|
Change Healthcare Breach Hits 100M Americans
( Krebs on Security )
|
Implement effective data authorization mechanisms to secure your data used in generative AI applications
( AWS Security Blog )
|
3 potential security risks to stay ahead of post-election
( Subscribe to Security Magazine's RSS Feed )
|
Cyber agencies reveal top 15 routinely exploited vulnerabilities
( Subscribe to Security Magazine's RSS Feed )
|
Secure by Design: AWS enhances centralized security controls as MFA requirements expand
( AWS Security Blog )
|
Adding threat detection to custom authentication flow with Amazon Cognito advanced security features
( AWS Security Blog )
|
#StopRansomware: RansomHub Ransomware
( CISA Cybersecurity Advisories )
|
More than 2,000 Palo Alto Networks firewalls compromised
( Subscribe to Security Magazine's RSS Feed )
|
Making employees your security shield
( Subscribe to Security Magazine's RSS Feed )
|
One in five organizations have experienced a NHI security incident
( Subscribe to Security Magazine's RSS Feed )
|
Threat modeling your generative AI workload to evaluate security risk
( AWS Security Blog )
|
Finastra investigates data breach, security leaders discuss
( Subscribe to Security Magazine's RSS Feed )
|
CISA Director Jen Easterly to resign, cybersecurity experts weigh in
( Subscribe to Security Magazine's RSS Feed )
|
Security leaders discuss risks and offer advice on seasonal scams
( Subscribe to Security Magazine's RSS Feed )
|
Security experts respond to the Amazon employee data breach
( Subscribe to Security Magazine's RSS Feed )
|
Your favorite security leadership podcasts
( Subscribe to Security Magazine's RSS Feed )
|
Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations
( CISA Cybersecurity Advisories )
|
Microsoft Patch Tuesday, November 2024 Edition
( Krebs on Security )
|
Secure root user access for member accounts in AWS Organizations
( AWS Security Blog )
|
2023 Top Routinely Exploited Vulnerabilities
( CISA Cybersecurity Advisories )
|
Unauthorized tactic spotlight: Initial access through a third-party identity provider
( AWS Security Blog )
|
Advice for Critical Infrastructure Security and Resilience Month
( Subscribe to Security Magazine's RSS Feed )
|
The role of artificial intelligence in cyber resilience
( Subscribe to Security Magazine's RSS Feed )
|
Russian Military Cyber Actors Target US and Global Critical Infrastructure
( CISA Cybersecurity Advisories )
|
Spring 2024 PCI DSS and 3DS compliance packages available now
( AWS Security Blog )
|
Fintech Giant Finastra Investigating Data Breach
( Krebs on Security )
|
Federated access to Amazon Athena using AWS IAM Identity Center
( AWS Security Blog )
|
How to guard against the holiday cyberattack surge
( Subscribe to Security Magazine's RSS Feed )
|
Byline: The new stress test
( Subscribe to Security Magazine's RSS Feed )
|
Malicious Python Package Index steals Amazon Web Services credentials
( Subscribe to Security Magazine's RSS Feed )
|
65% of websites aren’t protected from bots
( Subscribe to Security Magazine's RSS Feed )
|
Research uncovers the tool creating recent GitHub phishing attacks
( Subscribe to Security Magazine's RSS Feed )
|
Comprehensive Exchange Server recovery plan for IT and exchange admins
( Subscribe to Security Magazine's RSS Feed )
|
CISA Red Team’s Operations Against a Federal Civilian Executive Branch Organization Highlights the Necessity of Defense-in-Depth
( CISA Cybersecurity Advisories )
|
FBI: Spike in Hacked Police Emails, Fake Subpoenas
( Krebs on Security )
|
Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations
( CISA Cybersecurity Advisories )
|
Amazon identified internet domains abused by APT29
( AWS Security Blog )
|
Supply chain security: A key career skill
( Subscribe to Security Magazine's RSS Feed )
|
Chinese threat actor exploits credentials from password spray attacks
( Subscribe to Security Magazine's RSS Feed )
|
Black Friday gaming sales could be disrupted by bots
( Subscribe to Security Magazine's RSS Feed )
|
Booking.com Phishers May Leave You With Reservations
( Krebs on Security )
|
Inside The 2024 Security Benchmark Report
( Subscribe to Security Magazine's RSS Feed )
|
Maximize your cloud security experience at AWS re:Invent 2024: A comprehensive guide to security sessions
( AWS Security Blog )
|
Discover duplicate AWS Config rules for streamlined compliance
( AWS Security Blog )
|
How remote video verification is transforming commercial security
( Subscribe to Security Magazine's RSS Feed )
|
How to implement trusted identity propagation for applications protected by Amazon Cognito
( AWS Security Blog )
|
CISA Adds One Known Exploited Vulnerability to Catalog
( CISA Cybersecurity Advisories )
|
Security complexities of the remote workforce
( Subscribe to Security Magazine's RSS Feed )
|
60% increase in scam domain registrations targeting holiday shoppers
( Subscribe to Security Magazine's RSS Feed )
|
People’s Republic of China (PRC) Ministry of State Security APT40 Tradecraft in Action
( CISA Cybersecurity Advisories )
|
An Interview With the Target & Home Depot Hacker
( Krebs on Security )
|
Important changes to CloudTrail events for AWS IAM Identity Center
( AWS Security Blog )
|