$ page 32/35

Why Stryker's outage is a disaster recovery wake-up call

Stryker’s outage shows why cyber resilience, not just compliance, now defines business continuity in regulated industries.

7 min readMar 20

EU sanctions companies in china, Iran for cyberattacks

EU cyber sanctions on firms in China and Iran raise urgent supply chain, compliance, and vendor risk issues for businesses operating in Europe.

8 min readMar 20

Russian hackers exploit Zimbra flaw in ukrainian government attacks

APT28 hackers linked to Russia’s GRU are exploiting a Zimbra flaw to target Ukrainian government entities, highlighting urgent patching needs.

7 min readMar 20

Nation-State actor embraces AI malware assembly line

Pakistan-linked APT36 is using AI to mass-produce mediocre malware, shifting cyber risk from sophistication to scale and straining defenses.

7 min readMar 20

54 EDR killers abuse 34 signed vulnerable drivers to blind security tools

Researchers found 54 EDR killers abusing 34 signed vulnerable drivers via BYOVD, exposing a growing kernel-level threat to enterprise defenses.

7 min readMar 20

CISOs struggle to defend AI systems with outdated security tools, new study reveals

New study reveals majority of security leaders lack proper tools and skills to defend AI systems, creating critical vulnerabilities as organizations d

6 min readMar 19

Iran's Pre-Positioned cyber arsenal: Six-Month infrastructure buildup reveals new threat model

Iranian state actors spent six months building resilient cyber infrastructure using US shell companies, designed to survive military retaliation durin

5 min readMar 19

Iran-Backed hackers target medical giant Stryker with devastating wiper attack

Iran-backed hackers deploy destructive wiper malware against medical giant Stryker, forcing evacuation of 5,000 Irish workers and threatening global h

5 min readMar 19

AI-Powered cyberattack on Mexican government agencies exposes new era of sophisticated threats

Mexican government agencies fell victim to AI-powered cyberattacks using ChatGPT and Claude, exposing citizen data and highlighting new era of AI-enabled threats.

4 min readMar 19

Nordstrom's email system exploited in sophisticated cryptocurrency scam campaign

Cybercriminals exploited Nordstrom's legitimate email infrastructure to send cryptocurrency scam messages disguised as St. Patrick's Day promotions.

4 min readMar 19

North korean apts weaponize AI to supercharge IT worker infiltration scams

North Korean APTs are using AI tools like deepfakes and automated communications to enhance IT worker infiltration scams, making them harder to detect.

4 min readMar 19

Tycoon 2FA phishing empire crumbles: Europol takes down MFA-Bypassing criminal platform

International law enforcement dismantles Tycoon 2FA, a sophisticated phishing platform that helped cybercriminals bypass multi-factor authentication protections.

5 min readMar 19