Tips for mitigating the risks associated with these cyberattacks, which include cloud-environment intrusions, are provided.