Google has entered showbiz to convince young people that Android is cool too

Google Campus logo

Credit: Ryan Haines / Android Authority
  • Google has set up a new film and TV production company called “100 Zeroes.”
  • The name of the production house is a subtle nod to Google’s own name.
  • The company aims to craft content that positions Android and Google’s products as cool, desirable, and aspirational to a younger audience.

Apple’s bold move of moving into Hollywood with its Apple Originals banner laid the groundwork for Apple TV Plus. Now, Google is planting its own flag in showbiz, but it’s taking a very different approach.

This Android phone company makes my new favorite iPhone accessory

One of the best perks of having an iPhone is the sheer amount of available accessories. Much as Android fans may not like to admit it, finding the perfect case, screen protector, charging dock, etc., for an iPhone is significantly easier than doing the same for a Samsung Galaxy or Google Pixel. That point became even more apparent when Apple added MagSafe to the iPhone in 2020 — opening up a whole new world of magnetic accessories that Android phones have had to sit out on.

I have a fair share of MagSafe accessories I use daily with my iPhone 16. There’s an AUKEY charging dock on my nightstand that I put my iPhone on every night before bed. I also use Peak Design’s MagSafe wallet as my go-to wallet of choice. It’s slim, houses all the cards I need, and conveniently sticks on the back of my iPhone when I’m out and about.

Motorola’s Playlist Studio just ruined Spotify’s algorithm for me

As a longtime Spotify user, there’s plenty that I love about the streaming giant. It knows my music tastes better than I do, and I start shared jams almost every time I hang out with my friends. Yet, I often find myself a little frustrated and somewhat bored by my carefully tuned algorithm — I like the songs it picks, and it knows I like those songs, so it just keeps picking the same ones.

But now, there’s an AI-powered solution on the table, and it comes from an unexpected place. Motorola just introduced the playlist generator I’ve been waiting for, and I think it just might get me to rethink my relationship with Spotify. Here’s why.

This essential feature is missing from Pixel Launcher, and I’m tired of it

I often spend hours delicately tweaking my home screen, hand-picking each element and determining their best placement to ensure my device is perfect for my needs. This I do across all devices and launchers, even with Pixel Launcher. This makes the need to backup my various layouts especially important.

While I’ve previously written about how Pixel Launcher’s focus on minimalism has reduced distractions and improved my workflow on my Pixel 8, the default Google home experience still feels unfinished. It lacks several simple yet integral features that mature third-party Android launchers have offered for years, including a dedicated backup and restore feature.

Millions of Americans are getting a better Spotify experience very soon

Spotify on a phone next to a guitar

Credit: Edgar Cervantes / Android Authority
  • Spotify has submitted a new app update to Apple that will give millions of iOS users more flexibility in how they subscribe to Spotify plans and avail themselves of promotions.
  • The update will finally let Spotify users on iPhones and iPads see subscription prices, access promotions, and purchase Premium plans directly from the app.
  • By clicking a link within the app, users can go to Spotify’s website, where they can choose from a range of payment methods beyond Apple’s system.

In a major change that promises to improve the experience of millions of American users, Spotify has submitted long-awaited updates for its iOS app following a federal court ruling that forces Apple to relax its App Store restrictions.

Move over Gemini, Google’s best AI research assistant is getting its own app soon

notebooklm car manual feat

Credit: Andy Walker / Android Authority
  • Google is launching a standalone app for NotebookLM.
  • The app will let users create and access notebooks, upload sources, generate and listen to Audio Overviews of their content, and more.
  • The app is now available for pre-registration and will launch on Android and iOS on May 20.

Google has announced a release date for its dedicated NotebookLM app. While the name might not be the catchiest, NotebookLM is an incredibly useful and powerful AI tool for digging deeper into topics, whether for studying or just exploring your interests. Its availability has been restricted to the web since launch, but a few weeks back, Google teased that NotebookLM will be getting its own app. True to its word, Google has now announced that the NotebookLM app will be available later this month.

Get the Samsung Galaxy S25 Ultra for as low as $499.99!

Samsung Galaxy S25 Ultra hero

Credit: Ryan Haines / Android Authority

The Samsung Galaxy S25 Ultra is one of the most sought-after high-end devices out there, and it’s actually our favorite premium handset in our list of the best Android smartphones. There is no doubt that many of you want one, and our job is to get you the best deals. Today, you can save a nice chunk of change on the Samsung Galaxy S25 Ultra. We have two offers to show you, one from Amazon and one from Google Fi.

Get the Samsung Galaxy S25 Ultra from Amazon for $1,067.99 ($232 off)

Projector deals: I never thought projectors would get so good, portable, and affordable!

XGIMI MoGo 3 Pro

Credit: XGIMI

Growing up, I remember always wanting a projector. A rich friend had one, and I got hooked on the magical feeling that a dark room and a mini theater in his living room were like. It was nothing like watching TV, but projectors were large and expensive, so my Christmas wish list went ignored year after year. Now, projectors are getting better, smaller, portable, and most importantly, affordable. They can be cheaper than a TV, especially if you catch one at a discount. Here are a couple of great XGIMI ones you should consider.

Get the XGIMI Elfin Flip for just $299.99 ($10o off)

Cloud Security Challenges in Hybrid Environments: Navigating the Complexities of the Cloud

As businesses continue to embrace digital transformation, hybrid cloud environments—comprising a combination of on-premises infrastructure and public/private cloud resources—have become increasingly popular. The flexibility, scalability, and cost-efficiency offered by the cloud are undeniable, but they also introduce a unique set of security challenges that organizations must navigate.

While hybrid environments enable businesses to leverage the best of both worlds, they come with an added complexity that requires a more sophisticated approach to cloud security. In this article, we’ll explore the most common security challenges observed in hybrid cloud environments and how organizations can mitigate these risks.

1. Complex Visibility and Control

One of the foremost challenges in hybrid cloud environments is maintaining comprehensive visibility and control over both on-premises and cloud-based systems. With workloads and data dispersed across various platforms—private data centers, public cloud providers (like AWS, Microsoft Azure, or Google Cloud), and possibly even multiple clouds—ensuring complete monitoring and governance can be an arduous task.

Why it’s a challenge:

•    The use of different cloud providers introduces varying tools, security standards, and governance protocols, making it difficult to implement a uniform security policy across all environments.

•    Traditional security tools and frameworks designed for on-premises systems often struggle to adapt to the elastic nature of cloud-based services, leading to potential gaps in visibility.

Mitigation strategies:

•    Adopt a centralized cloud security platform that integrates multiple cloud environments and on-premises systems.

•    Use cloud-native security tools from providers that offer unified management interfaces, such as AWS Security Hub or Azure Security Center, to get a consolidated view of security alerts, configurations, and monitoring.

2. Data Security and Compliance Concerns

Data is often considered the lifeblood of organizations, and hybrid cloud environments create significant concerns about data security, privacy, and compliance. Storing sensitive information both on-premises and in the cloud increases the attack surface, making it harder to enforce consistent protection across all data assets.

Why it’s a challenge:

•    Ensuring data is encrypted both in transit and at rest is a constant challenge in hybrid environments, where different security controls may apply depending on where the data resides.

•    Regulatory requirements such as GDPR, HIPAA, and PCI-DSS can become more difficult to comply with when data is spread across various systems, potentially across different geographic regions.

Mitigation strategies:

•    Implement end-to-end encryption for data, regardless of whether it’s stored on-premises or in the cloud.

•    Leverage cloud services that provide built-in compliance certifications and features, such as data residency controls and audit logging.

•    Use Data Loss Prevention (DLP) tools to monitor, detect, and prevent unauthorized access to sensitive data.

3. Identity and Access Management (IAM)

Effective identity and access management is critical for protecting resources in any IT environment, but in hybrid environments, it becomes especially complex. In a hybrid model, employees, contractors, and services may access both on-premises systems and cloud services, requiring tight coordination between multiple IAM systems.

Why it’s a challenge:

•    Managing multiple identity providers (e.g., Active Directory, cloud IAM) increases the risk of inconsistent policies, which can lead to unauthorized access or privilege escalation.

•    The complexity of federating identities between on-premises and cloud systems without proper synchronization can create gaps in security.

Mitigation strategies:

•    Implement a unified identity and access management solution that can manage both on-premises and cloud-based access controls from a single interface.

•    Use tools such as Single Sign-On (SSO) and Multi-Factor Authentication (MFA) to strengthen authentication and ensure only authorized users can access critical systems and data.

•    Regularly audit and review access permissions to ensure that employees have the minimum necessary privileges, especially in cloud-based systems.

4. Insecure APIs and Integrations

In hybrid cloud environments, APIs play a central role in enabling communication between on-premises systems and cloud services. However, unsecured or poorly managed APIs can be a significant vulnerability, as they are often targeted by attackers to exploit weaknesses in the system.

Why it’s a challenge:

•    The sheer number of APIs used to connect disparate cloud and on-premises systems makes it difficult to track and secure them all.

•    If APIs are not properly secured, they can serve as entry points for attackers to exploit vulnerabilities in applications or data.

Mitigation strategies:

•    Implement secure API gateways that can monitor, authenticate, and control access to APIs.

•    Regularly perform vulnerability assessments and penetration testing on APIs to identify and fix weaknesses before they can be exploited.

•    Enforce API security best practices, such as using HTTPS, OAuth, and API rate limiting, to reduce the likelihood of exploitation.

5. Security Misconfigurations

Misconfigurations are one of the leading causes of security breaches in the cloud. Given the dynamic nature of hybrid environments, where systems are constantly being provisioned and decommissioned, ensuring that every cloud resource is configured securely can be a difficult task.

Why it’s a challenge:

•    Cloud providers offer a vast array of configurations, each with its own set of options and security implications, which can easily be misconfigured, leaving systems vulnerable.

•    Overly permissive default settings or insufficiently restrictive access policies can inadvertently expose sensitive resources to unauthorized users.

Mitigation strategies:

•    Leverage automated security configuration management tools (e.g., Terraform, AWS Config, or Azure Policy) to enforce compliance and prevent misconfigurations.

•    Adopt a “least privilege” access model to minimize unnecessary permissions and ensure that only the necessary users and services can access cloud resources.

•    Conduct regular configuration audits and vulnerability scans to identify and rectify any misconfigurations before they can lead to a breach

6. Lack of Skilled Security Professionals

Hybrid environments often require a highly specialized set of skills, especially when it comes to managing the security of both on-premises and cloud systems. The rapid adoption of cloud technologies has created a significant demand for skilled professionals who can manage hybrid environments securely, but the cybersecurity talent pool remains limited.

Why it’s a challenge:

•    As hybrid environments become more complex, organizations face difficulties in hiring and retaining cybersecurity professionals with expertise in both on-premises infrastructure and cloud platforms.

•    The growing volume of security alerts, complex threat landscapes, and continuous patch management require expertise that many in-house teams may lack.

Mitigation strategies:

•    Invest in training and upskilling your IT and security staff to bridge the knowledge gap between on-premises and cloud security best practices.

•    Consider leveraging managed security service providers (MSSPs) to augment your internal security team, providing expertise in hybrid cloud security without the need for additional full-time hires.

•    Adopt a shared responsibility model with cloud providers to understand what aspects of security are managed by the provider and what falls under your organization’s responsibility.

7. Insider Threats

In hybrid environments, where employees may access both on-premises and cloud resources from various locations and devices, insider threats—whether malicious or accidental—become a major security concern. Employees, contractors, or third-party vendors with privileged access can cause significant damage, whether intentionally or by error.

Why it’s a challenge:

•    Hybrid cloud environments often lack a consistent approach to monitoring and controlling insider access, particularly as users work across multiple environments.

•    The rise of remote work and Bring Your Own Device (BYOD) policies adds additional layers of complexity, increasing the chances of unintentional data exposure.

Mitigation strategies:

•    Implement strict access controls, including Zero Trust principles, where every request for access is continuously verified, regardless of the user’s location or device.

•    Deploy user and entity behavior analytics (UEBA) to detect anomalous activities that could indicate insider threats.

•    Regularly educate employees on the risks of insider threats, data handling policies, and how to identify and report suspicious activities.

Conclusion

While hybrid cloud environments offer significant advantages in terms of flexibility and scalability, they also introduce a unique set of security challenges that organizations must address to maintain a robust cybersecurity posture. From complex visibility and control issues to the risks associated with data security, APIs, and insider threats, organizations must adopt a proactive and multi-layered approach to cloud security.

By implementing best practices such as unified IAM systems, automated configuration management, secure APIs, and constant monitoring, businesses can mitigate the risks associated with hybrid cloud environments. As the hybrid cloud model continues to grow in popularity, staying ahead of these security challenges will be critical to maintaining the trust of customers, partners, and regulatory bodies alike.

The post Cloud Security Challenges in Hybrid Environments: Navigating the Complexities of the Cloud first appeared on Cybersecurity Insiders.

The post Cloud Security Challenges in Hybrid Environments: Navigating the Complexities of the Cloud appeared first on Cybersecurity Insiders.

DragonForce Ransomware behind Mark and Spencer digital outage

Almost a week ago, renowned UK-based retailer Marks & Spencer (M&S) became the victim of a devastating cyber attack that left the company in full-blown disruption mode. The retailer, known for its wide range of quality clothing, food, and household goods, now faces the aftermath of a sophisticated and well-executed cyber assault. Recent reports indicate that the attack is likely the work of a highly organized crime group, known as DragonForce, who deployed a powerful ransomware variant that could have caused lasting damage to the company’s IT infrastructure for days.

As the attack unfolded, M&S’s IT teams have been working around the clock to restore the company’s systems and resume normal operations. However, customers have reported ongoing issues, particularly with online bookings and technical glitches on the retailer’s website. The company’s internal networks were clearly disrupted, resulting in a series of cascading problems for both employees and customers trying to access M&S’s digital services.

The DragonForce Group and Its Methods

The group responsible for this cyber attack, DragonForce, is no stranger to high-profile ransomware incidents. Known for their “double extortion” tactics, they employ a two-pronged approach to cybercrime. First, DragonForce infiltrates the targeted organization’s systems and extracts sensitive data. Once they’ve secured the data, they encrypt it, effectively locking the company out of its own information until a ransom is paid. This ransom is typically demanded in cryptocurrency, making it difficult to trace the payments. The encryption locks the company’s access to its critical data, potentially crippling business operations for an extended period.

But the extortion doesn’t end there. Even after the ransom is paid, there is no guarantee that the attackers will provide the decryption key. The criminals often choose to sell the stolen data on the dark web, leaving the victimized company with not just the potential for business disruption but also the looming threat of data breaches and identity theft.

M&S’s Silence on the Attack

As of now, Marks & Spencer has refrained from making an official statement about the involvement of DragonForce or the specifics of the attack. The company has chosen to handle the situation discreetly, focusing on recovery efforts and planning to disclose the full details at a later time. While this level of confidentiality is understandable from a corporate standpoint, it leaves customers and the general public in the dark about the scope and severity of the breach.

However, the lack of an official update does raise questions about how deep the attack may have penetrated into the company’s systems. If the malware was as sophisticated as reports suggest, the recovery process could take much longer than initially anticipated.

The Ripple Effect of Cyber Attacks

Cyber-attacks of this magnitude bring significant consequences to the victimized companies. Apart from the immediate disruption to business operations, such attacks often tarnish the brand’s reputation. Consumers, especially those entrusting personal data to online services, tend to view a company’s inability to safeguard their information with skepticism. In M&S’s case, this could undermine years of consumer trust and loyalty.

Additionally, law enforcement agencies such as the FBI and Europol strongly advise against paying the ransom in situations like this. The primary reason being that paying the ransom not only funds criminal enterprises but also doesn’t guarantee the attackers will release the decryption key. In some cases, companies that comply with ransom demands find themselves targeted again, as cybercriminals perceive them as easy marks.

The Threat of Data Theft and Its Aftermath

In the case of “double extortion” ransomware attacks, the immediate concern isn’t just the disruption of business systems but the theft and sale of sensitive company data. DragonForce, like other ransomware groups, is known to sell this data on the dark web, where it can be used for a range of malicious purposes. This could include identity theft, fraud, and social engineering attacks targeting both the company’s customers and employees.

For businesses like M&S, the threat of customer data being sold on the dark web presents a long-term risk to their reputation and the safety of their clientele. Consumers who have their personal information exposed may face a variety of security risks, including financial fraud and phishing scams. This makes the impact of a cyberattack extend far beyond the immediate disruption, leaving companies to clean up the mess for months, or even years.

What Should Companies Do in Response?

The best course of action for any company facing a cyber attack is to refrain from paying the ransom. Instead, businesses should report the incident to the appropriate law enforcement authorities. Agencies like the FBI and Europol are equipped to track stolen data and monitor its potential sale on the dark web. By involving law enforcement early, companies can ensure that there are efforts to mitigate the risks of further data breaches and limit the damage caused by the attack.

Moreover, organizations should adopt proactive cybersecurity measures to help prevent future breaches. This includes regularly updating software and security patches, using strong encryption practices, training staff on phishing awareness, and investing in a robust backup system to ensure data can be recovered quickly in the event of an attack.

The Growing Threat of Cybercrime

The M&S incident underscores a broader trend in the growing sophistication of cybercriminal groups. As more businesses move online and digitize their operations, they become prime targets for ransomware attacks. The rise of ransomware-as-a-service has also made it easier for even less technically skilled criminals to launch such attacks. With the increasing frequency and severity of these incidents, it is more important than ever for organizations to take cyber threats seriously and adopt a comprehensive approach to cybersecurity.

In conclusion, while the immediate impact of the DragonForce attack on M&S is still unfolding, it serves as a stark reminder of the growing risks businesses face in the digital age. Proactive planning, strong cybersecurity defenses, and cooperation with law enforcement are essential to mitigate the damage caused by cybercriminals and protect the interests of both companies and their customers.

The post DragonForce Ransomware behind Mark and Spencer digital outage first appeared on Cybersecurity Insiders.

The post DragonForce Ransomware behind Mark and Spencer digital outage appeared first on Cybersecurity Insiders.

The Narwal Freo X Ultra vacuum and mop is a total steal at just $699.99

Narwal vacuums at CES 2024 (20) - Narwal Freo X Ultra

Credit: Edgar Cervantes / Android Authority

The Narwal Freo X Ultra has been our favorite robot vacuum and mop since we tested it. It is an impressive cleaning machine, but its retail price is also really high at $1,399.99. We’re not saying the tech isn’t worth the price, but I am not about to spend nearly a grand and a half on a robot, no matter how awesome it is. I’d rather wait and get a deal like today’s! You can get the Narwal Freo X Ultra for just $699.99, which is a 50% discount.

Buy the Narwal Freo X Ultra for just $699.99 ($700 off)

Hot deal: Get the latest Apple MacBook Air at a $150 discount

Apple MacBook Air M4 in bag

Credit: Apple

The Apple MacBook Air line-up has become among the most popular laptop series around, especially since the release of Apple’s own processors. The latest one is the Apple MacBook Air M4, which was only released this March. Deals are already starting to get good, too, as the Apple MacBook Air M4 has just reached a new record-low price of $849. That’s a $150 discount!

Get the Apple MacBook Air M4 for just $849 ($150 off)!

Chromecast with Google TV just got one of the best features from its expensive successor

Chromecast with Google TV HD 4

Credit: Edgar Cervantes / Android Authority
  • Google is widely rolling out the Home Panel to the Chromecast with Google TV and other Google TV devices.
  • The feature was previously available to those signed up for the Google Home public preview program.
  • The Home Panel allows you to control your smart home devices right from your Chromecast with Google TV and other compatible screens.

The Chromecast with Google TV may no longer be available, but that doesn’t mean Google is abandoning it. In fact, a new update dropped in March, bringing Android 14 to the popular streaming dongle. Now, Google’s erstwhile streamer is picking up the coveted Home Panel from its pricier successor, the Google TV Streamer.

Good news, US fans: The Nothing Phone 3 will be available Stateside

Nothing Phone 2 in gray with glyph lighting enabled

Credit: Damien Wilde / Android Authority
  • Nothing CEO Carl Pei has all but confirmed that the Nothing Phone 3 will launch in the US.
  • The confirmation is good news for fans amid ongoing tariff challenges in the US.
  • The device is expected to launch sometime in Q3 2025.

The Nothing Phone 3 has been nearly two years in the making, and expectations are running high. Nothing remains one of the few Android phone makers today that isn’t churning out cookie-cutter devices. Every recent release, whether it’s the Phone 3a series or the CMF Phone 2 Pro, has brought something unique to the table. With the Nothing Phone 3, we’re hoping for a true flagship killer. And the good news is, we might not have to wait much longer.

-- Get the right stuff from a partner you trust. --

Partners

-- IT NEWS --

Blog

admin December 20th, 2025

Credit: Razer You’ve probably seen a streamer or two wearing these headphones. They are absolutely the cutest, and right now, […]

admin December 20th, 2025

Credit: ASUS We just covered a great deal on the Samsung Odyssey Ark monitor. While that sale is awesome, paying […]

admin December 19th, 2025

TL;DR Samsung has officially announced the Exynos 2600 processor, the world’s first smartphone SoC built on a 2nm GAA (Gate-All-Around) […]