This post is cowritten with David Kim, and Premjit Singh from Ring. Scaling self-service support globally presents challenges beyond translation. In this post, we show you how Ring , Amazon’s home …
Homepage-Fragments
Code coverage is one of the most dangerous quality metrics in software testing. Many developers fail to realize that code coverage lies by omission: it measures execution, not verification. Test …
Inventors of Quantum Cryptography Win Turing Award Charles Bennett and Gilles Brassard have won the 2026 Turing Award for inventing quantum cryptography. I am incredibly pleased to see them get this …
Friday Squid Blogging: Bioluminescent Bacteria in Squid The Hawaiian bobtail squid has bioluminescent bacteria . Tags: squid Posted on March 27, 2026 at 4:18 PM • 29 Comments
Apple’s Camera Indicator Lights A thoughtful review of Apple’s system to alert users that the camera is on. It’s really well-designed, and important in a world where malware could surreptitiously …
A Taxonomy of Cognitive Security Last week, I listened to a fascinating talk by K. Melton on cognitive security, cognitive hacking, and reality pentesting. The slides from the talk are here , but—even …
Croatia’s Football Team Signed Deal With Gambling Sponsor Whose Rep Used Fake Name
This article is the result of a collaboration with Josimar. You can find Josimar’s corresponding piece here . Dragon Z6 said it became the Croatian national team’s “official sponsor” in May 2024. A …
Can your governance keep pace with your AI ambitions? AI risk intelligence in the agentic era
[ ](https://d2908q01vomqb2.cloudfront.net/artifacts/DBSBlogs/ML-20584/AIRITeaserShort.mp4?_=1) DevOps used to be predictable: same input, same output, binary success, static dependencies, concrete …
Compliance audits require comprehensive evidence trails, often involving hundreds of screenshots across multiple systems. Your compliance teams likely spend hours manually navigating through GitHub …
I’m excited to announce that AWS Security Agent on-demand penetration testing and AWS DevOps Agent are now generally available, representing a new class of AI capabilities we announced at re:Invent …
Quality assurance (QA) automation is critical for modern software delivery. It catches regressions before production, validates user journeys at scale, and enables confident feature releases. But …
Managing costs across multiple AWS accounts often requires finance teams to query data from several sources to get a complete view of spending and optimization opportunities. In this post, you learn …
** Ravie Lakshmanan ** Apr 01, 2026 Vulnerability / Browser Security Google on Thursday released security updates for its Chrome web browser to address 21 vulnerabilities, including a zero-day flaw …
Is “Hackback” Official US Cybersecurity Strategy? The 2026 US “ Cyber Strategy for America ” document is mostly the same thing we’ve seen out of the White House for over a decade, but with a more …
Google has formally attributed the supply chain compromise of the popular Axios npm package to a financially motivated North Korean threat activity cluster tracked as UNC1069 . “We have …
** Ravie Lakshmanan ** Apr 01, 2026 Data Breach / Artificial Intelligence Anthropic on Tuesday confirmed that internal code for its popular artificial intelligence (AI) coding assistant, Claude Code, …
3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)
For years, cybersecurity has followed a familiar model: block malware, stop the attack. Now, attackers are moving on to what’s next. Threat actors now use malware less frequently in favor of what’s …
French prosecutors are set to unveil money laundering charges against Dimitry Klyuev, an alleged mastermind of the Magnitsky Affair, the Russian tax fraud that triggered a global anticorruption …
A decade ago, the biggest network for journalists ever assembled set out to investigate a system built to stay hidden. What they uncovered became the Panama Papers, a sweeping investigation that broke …
Your AI agent worked in the demo, impressed stakeholders, handled test scenarios, and seemed ready for production. Then you deployed it, and the picture changed. Real users experienced wrong tool …
Monitoring competitor prices is essential for ecommerce teams to maintain a market edge. However, many teams remain trapped in manual tracking, wasting hours daily checking individual websites. This …
At a glance AI benchmarks report performance on specific tasks but provide limited insight into underlying capabilities; ADeLe evaluates models by scoring both tasks and models across 18 core …
Kia ora! Customers in New Zealand have been asking for access to foundation models (FMs) on Amazon Bedrock from their local AWS Region. Today, we’re excited to announce that Amazon Bedrock is now …
Providing new places to generate music High-quality music generation should be accessible wherever creativity happens. Whether you are an app developer, a business or music professional, or a creator, …
** Ravie Lakshmanan ** Apr 01, 2026 Malware / Windows Security A multi-pronged phishing campaign is targeting Spanish-speaking users in organizations across Latin America and Europe to deliver Windows …