| |
| ℹ️ News, Updates & Announcements |
| |
|
| |
| 🚨 Azure Service Health Built-In Policy (Preview) – Now Available! |
| |
| |
Microsoft just dropped Azure Service Health Built-In Policy (Preview). It lets teams push Service Health alerts across every Azure subscription—automatically—using Azure Policy. No more piecemeal setup.
It folds in AMBA lessons, supports custom rules and action groups, and locks in alert coverage at the management group level. Scale? Check. Consistency? Finally. |
|
| |
|
| |
|
| |
| Kali Linux can now run in Apple containers on macOS systems |
| |
| |
| Cybersecurity professionals can now launch Kali Linux in a virtualized container on macOS Sequoia using Apple's new containerization framework. Apple announced a new framework at WWDC 2025, allowing Apple Silicon hardware to run isolated Linux distros in a virtualized environment. There are limitations to the feature, as it's only available on Apple Silicon and has bugs related to networking. |
|
| |
|
| |
|
| |
| Project Ire autonomously identifies malware at scale |
| |
| |
Microsoft just dropped Project Ire, an autonomous AI that tears through software like a experienced reverse engineer. It decompiles, analyzes, classifies malware—all on its own. Under the hood: LLMs, decompilers, and a tool-use API running the show.
On public Windows driver datasets, it scored 0.98 precision and 0.83 recall, and even called out APT malware that slipped past older detection tools. |
|
| |
|
| |
|
| |
| Introducing Approvals in Pulumi ESC |
| |
| |
Pulumi ESC just leveled up with Approvals—structured reviews for environment config changes, straight from Console, CLI, SDK, or VS Code. Think pull requests, but for your infra settings. No more YOLO updates.
Teams can now lock down config changes with required sign-offs. More control. Cleaner logs. Real governance.
What’s the big deal? Config management finally plays by the same rules as code: reviewable, auditable, and access-controlled. |
|
| |
|
| |
|
| |
| Building on the foundation of OpenTelemetry eBPF Instrumentation: what’s new in Grafana Beyla 2.5 |
| |
| |
Grafana Beyla 2.5 goes all-in on upstream OpenTelemetry eBPF Instrumentation, baking it right into the core. This release adds auto-instrumentation for MongoDB and JSON-RPC, manual spans in Go, and tighter trace correlation for NodeJS.
New in town: survey mode. Think lightweight service discovery—no full-blown instrumentation needed. |
|
| |
|
| |
|
| |
| How to automatically disable users in AWS Managed Microsoft AD based on GuardDuty findings |
| |
| |
AWS just dropped a new threat-response setup that ties GuardDuty, EventBridge, Step Functions, and Systems Manager Run Command into one clean pipeline. The goal? Hunt for EC2 threats and lock down Active Directory accounts—automatically.
GuardDuty kicks off the flow when it spots trouble. From there, EventBridge routes the signal, Step Functions handles the logic, and Systems Manager hits AD with the lockout.
Bigger picture: This isn’t just a clever workflow. It’s part of the shift toward wiring security into your stack—natively, instantly, and without humans in the loop. |
|
| |
|
| |
|
| |
| Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives |
| |
| |
| In observing Perplexity's stealth crawling behavior, it was noted that they obscure their crawling identity in an attempt to circumvent website preferences by modifying user agents and changing ASNs. Despite being blocked, Perplexity's crawlers continued to try to access restricted content, using undisclosed IPs and user agents. |
|
| |
|
| |
| 👉 Enjoyed this?Read more news on FAUN.dev/news |