Hackers Using Compromised Google Cloud Accounts to Mine Cryptocurrency

Threat actors are exploiting improperly-secured Google Cloud Platform (GCP) instances to download cryptocurrency mining software to the compromised systems as well as abusing its infrastructure to install ransomware, stage phishing campaigns, and even generate traffic to YouTube videos for view count manipulation. “While cloud customers continue to face a variety of threats across applications and…

Cybersecurity and Hijacked IP Addresses

With the rise in ransomware and cyberattacks on businesses of all sizes, executives need to be vigilant about protecting their business and protecting their data. Here’s the challenge: new forces are going to make this harder than ever before. Consider this: As demand for IPv4 resources rise, shortages of supply have increased IP address prices.…