Security News

A latest report shared with The Hacker News detailed how the BeVigil search engine identified over 40 apps - with more than a cumulative 100 million downloads - that had hardcoded private Amazon Web Services keys embedded within them, putting their internal networks and their users' data at risk of cyberattacks. The findings are the result of an analysis of over 10,000 apps submitted to CloudSEK's BeVigil, a mobile app security search engine.

Lacework has announced that it has extended native security support for Amazon Web Services services including AWS Graviton2 and AWS Fargate. These additions give Lacework customers using AWS in-depth security visibility, threat detection, configuration compliance, and context into cloud security data and changes for all compute types: virtual machines, containers, containers as services, containers on demand, bare metal and serverless.

From backup and disaster recovery for Amazon Elastic Kubernetes Services, disaster recovery across AWS Regions or Availability Zones, and new backup capabilities for AWS focused on cost optimization and security to safeguard companies from malicious intent. Zerto backup and disaster recovery for Amazon EKS is a new offering that integrates backup and disaster recovery into the application deployment lifecycle for Amazon EKS. Organizations can now easily protect, recover, and move any Kubernetes application and its persistent data for a native, data protection as code experience.

F1 Insights powered by AWS are real-time racing statistics, displayed as on-screen graphics, that transform the fan experience before, during, and after each race by providing the data and analysis fans need to interpret driver and team race strategy and performance. F1 racing is a data-driven sport where much of the thrill for fans comes from poring over statistics before and after a race to gain a deeper understanding of driver and team decisions and cars' performance on the track.

Guardicore unveiled new zero trust assessment capabilities in Infection Monkey, its open source breach and attack simulation tool. Available immediately, security professionals will now be able to conduct zero trust assessments of AWS environments to help identify the potential gaps in an organization's AWS security posture that can put data at risk.

Amazon Web Services announced the general availability of AQUA for Amazon Redshift, an innovative new distributed and hardware-accelerated cache that delivers up to ten times better query performance than other enterprise cloud data warehouses. AQUA brings compute to the storage layer, helping customers avoid networking bandwidth limitations by eliminating unnecessary data movement between where data is stored and compute clusters.

Cybersecurity firm Securonix has announced a new level to its collaboration with AWS that will allow AWS customers to use Securonix security information and event management software without ever leaving their current AWS hosting solutions. Securonix describes the new collaborative product as a "Bring your own cloud" program "Providing customers with deployment options that are aligned with their cloud strategies, data retention requirements and overall business needs."

Threat Stack supports AWS Graviton2-based instances through the Threat Stack Cloud Security Platform
Threat Stack announced its ability to support AWS Graviton2-based instances through the Threat Stack Cloud Security Platform. The rapid adoption of AWS Graviton2 workloads presents a challenge for security leaders as many of today's legacy tools do not support it.

Seth Aaron Pendley was arrested in Ft. Worth after allegedly attempting to get an explosive device from an undercover FBI employee in a sting. The feds were alerted to Pendley after a concerned citizen contacted them on Jan. 8 about posts from Pendley on MyMilitia.com, a forum dedicated to organizing militia groups.

The FBI arrested a Texas man on Thursday for allegedly planning to "Kill of about 70% of the internet" in a bomb attack targeting an Amazon Web Services data center on Smith Switch Road in Ashburn, Virginia. Seth Aaron Pendley, 28, was charged via criminal complaint on Friday morning for attempting to destroy a building using C-4 plastic explosives he tried to buy from an undercover FBI employee.