(Adobe Stock) Stryker cyberattack contained, but experts warn repair costs could soarSteve ZurierMarch 17, 2026Security pros call “containment” victory claim hollow as recovery could cost multi-millions.
When it comes to quantum safety, sovereignty demands architectural clarityAntonio SanchezMarch 17, 2026
Iran and the expanding cyber front: What government leaders need to knowMichael R. CentrellaMarch 16, 2026
Identity security as app growth accelerates: Why automation is becoming essentialPaul WagenseilMarch 7, 2026
Use of the MITRE Attack framework in threat detection with ThreatLocker’s John LillistonSC StaffMarch 6, 2026
Threat ManagementPhishing emails target AI defenses with unique obfuscationLaura FrenchMarch 17, 2026Benign content hidden at the bottom of an email is designed to “outweigh” malicious content.
AI/MLClickFix campaigns target macOS users via MacSync infostealerSteve ZurierMarch 16, 2026ClickFix campaigns use fake ChatGPT tools and Terminal tricks to infect macOS with MacSync infostealer.
AI/MLAI phishing, malicious SVGs continues after surge over holidaysLaura FrenchMarch 13, 2026HoxHunt reports AI-generated phishing increased from 4% to 56% of phishing attempts in December.
Threat ManagementNo restoration timeline for medical device maker Stryker after cyberattackSteve ZurierMarch 13, 2026Company also tells customers the attack by Iran-linked Handala disrupted supply chain.
Vulnerability ManagementCISA adds n8n RCE flaw to list of known exploited vulnerabilitiesLaura FrenchMarch 13, 2026An authenticated attacker could execute arbitrary code with elevated privileges.
Threat ManagementIran-linked group claims wiper attack and takedown of medical device maker StrykerSteve ZurierMarch 12, 2026Second major case targeting a U.S. firm after start of Iran conflict Feb. 28.
Threat Management‘Zombie ZIP’ slips malware past 98% of antivirus enginesLaura FrenchMarch 12, 2026A simple exploit causes AVs to treat compressed data as uncompressed bytes.
RansomwareBlackSanta ‘EDR-killer’ malware targets HR departmentsSteve ZurierMarch 11, 2026Malware collects info about the OS, user accounts, and host configurations.