Stryker attack raises concerns about role of device management tool
A suspected wiper attack against medtech giant Stryker has led much of the security community to examine the role of Microsoft Intune. Stryker, a Portage,…
A suspected wiper attack against medtech giant Stryker has led much of the security community to examine the role of Microsoft Intune. Stryker, a Portage,…
Professional NBA and NFL athletes were allegedly deceived and victimized by a 34-year-old Georgia man’s sneaky social-engineering scheme that he ran while impersonating a well-known…
Security researchers at Qualys have disclosed nine vulnerabilities in AppArmor, the Linux Security Module that ships enabled by default across Ubuntu, Debian, and SUSE distributions.…
Fake shipment tracking scams are rapidly scaling across the world, exploiting the 161 billion annual parcel volume that fuels global e-commerce, according to threat intelligence…
New cybersecurity regulations for drinking water and wastewater systems have been announced in New York, alongside a US$2.5 million grant program designed to help communities…
Global identity security technology vendor ARCON and DNV Cyber formed a new partnership that will strengthen ARCON’s presence in the Nordics and further enhance DNV…
Recent cyberattacks attributed to Iranian threat actors extend beyond typical network disruption. Rather than an isolated incident of sabotage, this type of attack sits within…
What is credential theft? At its core, credential theft is the unauthorized acquisition of login credentials such as usernames, passwords, or session tokens by a…
Drone strikes hit a key chip supply chain. China-linked hackers target Southeast Asian militaries. Attackers race ahead with AI. ShinyHunters claim a massive Telus breach.…
Last week’s cyberattack on medical technology giant Stryker was limited to its internal Microsoft environment and remotely wiped tens of thousands of employee devices. The…
A concerning development has emerged in early 2026, as IBM X-Force uncovered a likely AI-generated malware strain they named “Slopoly,” deployed during a ransomware attack…
Handala Hack is an Iranian state-linked destructive actor that combines old-school RDP-heavy intrusions with new tools like NetBird and AI-assisted wipers to devastate victim networks…