Cloud Consultancy News
Only 9% of IT budgets are dedicated to security
Despite their best efforts, 67% of businesses say they need to improve security and compliance measures with 24% rating their organisation’s security and compliance strategy as reactive, according to Vanta. The expansion of attack surfaces in a post-pandemic hybrid...
Google Drive users angry over losing months of stored data
Google Drive users are reporting that recent files stored in the cloud have suddenly disappeared, with the cloud service reverting to a storage snapshot as it was around April-May 2023. Google Drive is a cloud-based storage service that allows people to store and...
Broadcom completes $69 billion acquisition of VMware in cash and stock
Broadcom has announced it has cleared all regulatory hurdles and plans to complete its $69 billion acquisition of VMware. The company announced it planned to move ahead with the deal after China joined the list of countries that had given a go-ahead for the...
South Korea to invite 100K citizens to test CBDC in 2024
The Bank of Korea (BOK) — South Korea’s central bank — has said it will invite 100,000 Korean citizens to purchase goods with deposit tokens as part of its central bank digital currency (CBDC) pilot. The testing will start “around September to October” of 2024 and...
Attack on direct debit provider London & Zurich leaves customers with 6-figure backlogs
Source: TheRegister Author: Connor Jones A ransomware attack and resulting outages at direct debit collection company London & Zurich has forced at least one customer to take out a short-term loan as six-figure backlogs continue to cause cash flow mayhem. London...
Apple is testing an imminent iPhone update to squash more iOS 17 bugs
Get your iPhones ready: Apple is secretly working on a new iOS 17.1.2 update, based on results in a news site’s visitor data. MacRumors reported Monday that it had spotted visits from browsers running iOS 17.1.2, which has not yet been released to the public or even...
How Multi-Stage Phishing Attacks Exploit QRs, CAPTCHAs, and Steganography
Phishing attacks are steadily becoming more sophisticated, with cybercriminals investing in new ways of deceiving victims into revealing sensitive information or installing malicious software. One of the latest trends in phishing is the use of QR codes, CAPTCHAs, and...
Russia’s LitterDrifter USB Worm Spreads Beyond Ukraine
A recently identified USB worm attributed to the Russia-linked advanced persistent threat (APT) group Gamaredon appears to have spread beyond Ukraine, its likely intended target, cybersecurity firm Check Point reports. Also tracked as Armageddon, Aqua Blizzard,...
Beware: Malicious Google Ads Trick WinSCP Users into Installing Malware
Threat actors are leveraging manipulated search results and bogus Google ads that trick users who are looking to download legitimate software such as WinSCP into installing malware instead. Cybersecurity company Securonix is tracking the ongoing activity under the...
MOVEit hackers leverage new zero-day bug to breach organizations (CVE-2023-47246)
Lace Tempest has previously exploited zero-day vulnerability (CVE-2023-34362) in Progress Software’s MOVEit Transfer installations to steal data from many enterprises and public sector organizations. The group has also similarly leveraged zero days in the Accellion...