(Adobe Stock) Iran-linked group claims wiper attack and takedown of medical device maker StrykerSteve ZurierMarch 12, 2026Second major case targeting a U.S. firm after start of Iran conflict Feb. 28.
How to build a breach-ready security posture without the enterprise price tagAdriel DesautelsMarch 11, 2026
Use of the MITRE Attack framework in threat detection with ThreatLocker’s John LillistonSC StaffMarch 6, 2026
Threat Management‘Zombie ZIP’ slips malware past 98% of antivirus enginesLaura FrenchMarch 12, 2026A simple exploit causes AVs to treat compressed data as uncompressed bytes.
RansomwareBlackSanta ‘EDR-killer’ malware targets HR departmentsSteve ZurierMarch 11, 2026Malware collects info about the OS, user accounts, and host configurations.
Incident ResponseFirst CIRM warranty protecting employees from breach liability announcedLaura FrenchMarch 11, 2026BreachRx warranty covers up to $3 million in personal or corporate penalties stemming from an incident.
Cloud SecuritySalesforce confirms ShinyHunters exploited Experience Cloud sitesSteve ZurierMarch 10, 2026The ShinyHunters cybercrime group has systematically targeted Salesforce instances since mid-2025.
Application securityMozilla fixes 22 Firefox vulnerabilities discovered by Anthropic’s Claude AILaura FrenchMarch 10, 2026Anthropic recently published coordinated disclosure policies for Claude-discovered flaws.
Governance, Risk and ComplianceTrump cyber policy focuses on offensive operations, harnessing AISteve ZurierMarch 9, 2026Trump cyber policy shifts from secure-by-design towards offensive operations.
Vulnerability Management3 Apple flaws from Coruna exploit kit added to CISA vulnerability listLaura FrenchMarch 6, 2026The exploit kit affects versions of iOS between 13.0 and 17.2.1.
Threat ManagementIranian APT group MuddyWater targets multiple US companiesSteve ZurierMarch 6, 2026Recent Iranian campaign picked up after the Feb. 28 U.S.-Israel attack.