Page 2
-
US, allies move to dismantle four high-volume IoT botnets
The armies of hacked computers and internet of things gadgets powered disruption and extortion campaigns that sometimes cost victims tens of thousands of dollars.
-
CISA urges organizations to harden endpoint security following Stryker attack
The agency is coordinating with the FBI and other agencies amid concerns about additional threat activity involving Microsoft Intune.
-
Water utilities need hands-on cybersecurity help, not just free guidance, pilot program finds
In a new report, Microsoft criticized the federal government for scaling back support to critical infrastructure operators.
-
New research unpacks North Korea’s stealthy, sophisticated remote IT worker schemes
The report recommends that businesses practice several forms of vigilance to avoid unwittingly hiring Pyongyang’s operatives.
-
Threat groups target cyber-physical systems to disrupt critical infrastructure providers
The Iran war has raised concerns that key industrial sectors could be the target of hacktivists, state actors and other groups.
-
Stryker begins restoring ordering, shipping systems after cyberattack
The medtech company believes the cyberattack has been contained and is now bringing systems back online.
-
National cyber director expands on Trump administration’s vision for AI security, industry collaboration
The government wants AI firms to embrace security, not see it as a barrier.
Updated March 17, 2026 -
Security teams might be overlooking wider threat to Cisco SD-WAN
Researchers from VulnCheck warn that a misattributed proof of concept ignores a separate, high-severity flaw.
-
Stryker attack raises concerns about role of device management tool
Researchers warn that Microsoft Intune may have been weaponized to wipe critical devices.
-
Telus Digital confirms hack as ShinyHunters claims credit for massive data theft
The Canadian business-process outsourcer, which counts many major businesses among its customers, still isn’t sure what the hackers stole.
-
Robotics firm Intuitive Surgical says cyberattack compromised business, customer data
The company said an intruder accessed employee information, customer contact details and other records.
-
Stryker’s manufacturing, shipping disrupted after cyberattack
The medtech company says it's still experiencing issues with order processing, manufacturing and shipping.
-
Even primitive AI-coded malware helps hackers move faster, thwart attribution
IBM researchers discovered an autonomously coded backdoor that they called unsophisticated but nonetheless ominous.
-
Stryker investigating cyberattack that caused widespread outage
The full scope of the impact on the medical equipment firm, including operational and financial effects, remains unclear.
Updated March 12, 2026 -
Retrieved from NASA's Moderate Resolution Imaging Spectroradiometer.
Coalition of information-sharing groups warns of cyber, physical attacks
A joint advisory says Iran-linked groups are targeting U.S. critical infrastructure using DDoS, phishing and other retaliatory techniques.
Updated March 12, 2026 -
5 ways to protect manufacturing companies from cyberattacks
Manufacturing suffered the most cyberattacks of any industry last year. Experts have advice about hardening networks and avoiding common mistakes.
-
Google completes $32B acquisition of Wiz
The cloud security specialist will continue to operate under its own brand and across multiple platforms.
-
R. Eskalis/NIST. Retrieved from NIST.
Industry to NIST: Keep agentic AI standards flexible and voluntary
The business community said security guidance should reflect the nascency and diversity of the field.
-
US entities face heightened cyber risk related to Iran war
The military campaign against Iran is putting local governments, critical infrastructure providers and major U.S. companies at heightened risk of disruptive attacks.
-
Trump administration will test infrastructure cybersecurity approaches in pilot program
The government can’t rely on a “universal solution” to the challenges facing vital services, a top White House official said.
-
Retrieved from GAO.
Conflicting definitions and timelines cause cybersecurity regulation morass, industry reps say
A recent Government Accountability Office report highlights businesses’ frustrations with the way the government currently oversees cybersecurity.
-
State-linked actors targeted US networks in lead-up to Iran war
Researchers found backdoors installed on U.S. company networks in the weeks prior to the U.S. and Israeli bombing campaign.
-
Trump’s new cybersecurity strategy makes promises but lacks details
In a document released Friday, the administration vowed to increase the government’s use of AI for rapid cyber defense.
-
Nearly half of exploited zero-day flaws target enterprise-grade technology
A report by Google Threat Intelligence Group warns that AI will be used to speed and scale attacks in 2026.
-
HHS adds cybersecurity guidance to healthcare sector self-assessment tool
Organizations can now use the online platform to test their readiness for digital security crises.