U.S. organizations targeted by fraudulent ransomware group using hollow data leak warnings

A group of fraudulent extortionists are exploiting data breaches and ransomware attacks to scam US companies. They threaten to sell or publish allegedly stolen data unless payment is made. In some cases, the group has added a distributed denial-of-service (DDoS) attack threat. The group, calling themselves Midnight, impersonates ransomware and data extortion gangs in emails, […]

The Continuing Importance of Cybersecurity for Businesses

As businesses face a challenging economic environment in 2023, cybersecurity remains a top priority due to the increasing prevalence of cyberattacks and exploding data volumes. Even though 65% of organizations plan to increase their cybersecurity spending this year, organizations must not ease up on cybersecurity efforts. All businesses are at risk of cyber threats, and […]

Experts claim that a popular Chinese app has the capability to spy on its users

Pinduoduo, one of China’s most popular e-commerce platforms with over 750 million users a month, has been found to have malware in its app, according to several cybersecurity researchers. The malware, which exploits vulnerabilities in Android operating systems, can monitor users’ activities on other apps, access notifications, read private messages and change settings. Experts have […]

A North Korean hacking group utilizes cryptocurrency theft, cryptomining, and money laundering as tools in their arsenal

A North Korean hacking group, known as APT43, has been found to utilize a unique money-laundering scheme involving stolen cryptocurrency and rented services to create clean digital currency, according to a report from Google’s Mandiant. The group, which has been operational since at least 2012, focuses on cyberespionage, but also steals cryptocurrency to fund its […]

Does Your Multicloud Strategy Include Cloud Repatriation?

Cloud repatriation is becoming increasingly common as organizations repatriate workloads or applications from public clouds to in-house or other locations. Repatriation is usually due to technical misfires or perceived cost inefficiencies associated with fast-growing public cloud consumption. However, repatriation should not be considered a failure, but rather a tactical lever for workload placement that can […]