Tag: cyberattack
-
Europe sanctions Chinese and Iranian firms for cyberattacks
The European Union Council has announced sanctions against three entities and two individuals for their involvement in cyberattacks targeting critical infrastructure in the region. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/europe-sanctions-chinese-and-iranian-firms-for-cyberattacks/
-
Stryker says it’s restoring systems after pro-Iran hackers wiped thousands of employee devices
The hack, which brought ongoing widespread disruption to the company’s operations, is thought to be the first major cyberattack in the United States in response to the Trump administration’s war in Iran. First seen on techcrunch.com Jump to article: techcrunch.com/2026/03/17/stryker-says-its-restoring-systems-after-pro-iran-hackers-wiped-thousands-of-employee-devices/
-
Cyber-Attacken fluten Eon-Netz: Angriffe verzehnfacht
Eon trägt eine große Verantwortung für die Energieversorgung in Deutschland.Der Energiekonzern Eon sieht eine zunehmende Zahl von Cyberangriffen auf seine Energienetze. Mittlerweile seien täglich mehrere hundert Angriffe auf die Netzinfrastuktur zu verzeichnen, berichtete Vorstandsmitglied Thomas König am Montag im Austausch mit Journalisten. Im Vergleich zu von vor fünf Jahren habe sich die Zahl damit verzehnfacht.Der Manager verwies in diesem…
-
EU sanctions Chinese company behind 65,000-device hack
The EU Council has sanctioned companies from China and Iran, along with two individuals, over cyberattacks targeting its member states and partners. “Those listed are subject … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/17/eu-sanctions-china-iran-cyberattacks/
-
Fertigungsindustrie ist Top-Ziel für Cyberangriffe – OT-Angriffe kommen meist über kompromittierte IT-Systeme
Tags: cyberattackFirst seen on security-insider.de Jump to article: www.security-insider.de/ot-angriffe-it-systeme-a-17e7fb999223bbf432dcddd28f12cfd0/
-
Chinesische APT-Gruppe Camaro Dragon nutzt Nahost-Konflikt für Malware-Kampagne gegen Katar aus
Check Point Research (CPR), die Sicherheitsforschungsabteilung von Check Point Software Technologies hat eine Malware-Kampagne beobachtet, die sich an Ziele in Katar richtet und Foto-Archive mit Bildern aus dem Konflikt in Nahost als Lockmittel nutzt, um Malware einzuschleusen. Kurz nach Beginn der Angriffe am 1. März beobachtete CPR gezielte, mutmaßlich per E-Mail durchgeführte Kampagnen gegen Einrichtungen…
-
Mehr Befugnisse, mehr Verantwortung Was aktive Cyberabwehr technisch bedeutet
Ende Februar hat das Bundesinnenministerium einen Referentenentwurf des ‘Gesetz zur Stärkung der Cybersicherheit” veröffentlicht. Der Gesetzesentwurf stößt jedoch auf Kritik. Adam Marrè, CISO bei Arctic Wolf, teilt seine Gedanken zum geplanten Gesetz und dessen Bedeutung für die Cyberabwehr. ‘Angesichts der zunehmenden Zahl schwerer Cyberangriffe ist es nachvollziehbar, dass Regierungen ihre Möglichkeiten zur Abwehr digitaler Bedrohungen erweitern…
-
Cyberangriffe seit Iran-Krieg um 245 Prozent gestiegen
Der Sicherheitsanbieter Akamai meldet einen Zuwachs von 245 Prozent beim schädlichen Internetverkehr. Angreifer operieren vor allem über Proxy-Infrastruktur in Russland und China. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/cyberangriffe-seit-iran-krieg
-
ITStrategie: Warum Zero Trust und One Identity jetzt unverzichtbar sind
Die meisten Cyberangriffen in der EU finden in Deutschland statt, und die Schwachstellen in den IT-Infrastrukturen nehmen täglich zu. Viele Unternehmen stehen daher vor der Frage, wie sie ihre IT-Sicherheit strategisch neu ausrichten können. Im Interview stellen Stefan Rothmeier und Sebastian Fuchs von T.CON das Konzept »Zero Trust« vor und erläutern, wie die Umsetzung gelingt. First…
-
Attack on Stryker’s Microsoft environment wiped employee devices without malware
The recent cyberattack on Stryker wiped tens of thousands of employee devices through its Microsoft environment, and systems are still offline. A recent cyberattack on medical technology giant Stryker targeted its internal Microsoft environment and remotely wiped tens of thousands of employee devices without using malware. The company confirmed that its medical devices were not…
-
Stryker Targeted by Large-Scale Wiper Attack, Tens of Thousands of Devices Lost
Global medical technology giant Stryker suffered a massive cybersecurity incident on March 11, 2026, resulting in the remote wiping of thousands of corporate devices. A pro-Iranian hacktivist group known as Handala has claimed responsibility for the attack, which severely disrupted Stryker’s internal Microsoft environment, manufacturing, and shipping operations. Technical Execution Vector Unlike traditional destructive cyberattacks,…
-
Health Sector Braces for Stryker Hack Supply Chain Shock
Medical Device Manufacturer Hack Was Likely Opportunistic. An Iranian cyberattack on medical device maker Stryker’s internal IT environment does not appear to affect connected products used by the company’s healthcare clients. But an outage of Stryker’s electronic ordering system could lead to supply chain issues for its customers. First seen on govinfosecurity.com Jump to article:…
-
Stryker attack wiped tens of thousands of devices, no malware needed
Last week’s cyberattack on medical technology giant Stryker was limited to its internal Microsoft environment and remotely wiped tens of thousands of employee devices. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/stryker-attack-wiped-tens-of-thousands-of-devices-no-malware-needed/
-
Poland Suspects Iranian Actors are Behind Attack on Its Nuclear Power Center
Poland officials say the cyberattack late last week appears to have been launched by an Iranian threat group, though they noted that bad actors not associated with any country in the war could have been behind it and used tactics associated with Iranian threat groups to cover their own tracks. First seen on securityboulevard.com Jump…
-
Stryker says hospital tools are safe, but digital ordering systems still down after cyberattack
Electronic ordering systems belonging to the medical device company Stryker are still down a week after a cyberattack believed to have wiped thousands of company devices of all information. The company said its digital products are safe for use. First seen on therecord.media Jump to article: therecord.media/stryker-cyberattack-impact-iran
-
Cyberattack disrupts parking payments in Russian city
The Russian city of Perm has restored its parking payment system after a cyberattack knocked the service offline. First seen on therecord.media Jump to article: therecord.media/cyberattack-russia-parking-system
-
16th March Threat Intelligence Report
United States-based medical technology company Stryker has suffered a cyberattack that caused a global disruption to its environment. The company said its surgical robotics, clinical communications platform, and life support monitors are […] First seen on research.checkpoint.com Jump to article: research.checkpoint.com/2026/16th-march-threat-intelligence-report/
-
Global Threat Report 2026 von Crowdstrike – Schnellster KI-Angriff 2025 dauerte nur 27 Sekunden
First seen on security-insider.de Jump to article: www.security-insider.de/crowdstrike-ki-cyberangriffe-breakout-time-prompt-manipulation-a-19131ec29d48c1304d61a1966b6f9659/
-
Global Threat Report 2026 von Crowdstrike – Schnellster KI-Angriff 2025 dauerte nur 27 Sekunden
First seen on security-insider.de Jump to article: www.security-insider.de/crowdstrike-ki-cyberangriffe-breakout-time-prompt-manipulation-a-19131ec29d48c1304d61a1966b6f9659/
-
Robotics firm Intuitive Surgical says cyberattack compromised business, customer data
The company said an intruder accessed employee information, customer contact details and other records. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/intuitive-surgical-cyberattack-phishing/814746/
-
Former Germany’s foreign intelligence VP hit in Signal account takeover campaign
Former BND VP Arndt Freytag von Loringhoven was targeted in a Signal cyberattack, part of a wave hitting officials and politicians in Germany. A cyberattack targeting Signal and WhatsApp users has hit high-ranking German officials, including former BND Vice President Arndt Freytag von Loringhoven. The official reported being contacted by someone posing as Signal support…
-
Cyberattack Hits Poland’s Nuclear Research Center
Poland’s National Centre for Nuclear Research recently experienced a targeted cyberattack aimed at its IT infrastructure. Security teams successfully thwarted the intrusion before malicious actors could compromise critical systems or access sensitive data. The facility, which houses the country’s sole operational nuclear reactor, maintained full operational continuity throughout the entire security incident. As cyber threats…
-
CamelClone Uses Public File-Sharing Sites in Government Cyberattacks
A new cyber espionage campaign dubbed Operation CamelClone, targeting government and strategic sectors across several geopolitically significant regions. The campaign abuses legitimate tools and public file”‘sharing platforms to deliver malware and steal sensitive data, making it harder for defenders to detect. The operation primarily targets organizations linked to government and national security interests. Industries affected…
-
Cyberangriff: Hacker attackieren polnischen Kernreaktor-Betreiber
Polens nationales Nuklearforschungszentrum bestätigt einen versuchten Cyberangriff auf die eigene IT. Erste Spuren weisen angeblich Richtung Iran. First seen on golem.de Jump to article: www.golem.de/news/cyberangriff-hacker-attackieren-polnischen-kernreaktor-betreiber-2603-206533.html
-
macOS-Nutzer geraten stärker ins Visier von Cyberkriminellen
Sicherheitsforscher beobachten eine zunehmende Zahl gezielter Angriffe auf macOS-Systeme. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/macos-nutzer-gerate-cyberkriminellen
-
»Eine ITStrategie für komplexe Landschaften zu entwickeln, sollte zu Jahresbeginn ganz oben auf der Agenda stehen« Warum Zero Trust und One Identity jetzt unverzichtbar sind
Die meisten Cyberangriffen in der EU finden in Deutschland statt, und die Schwachstellen in den IT-Infrastrukturen nehmen täglich zu. Viele Unternehmen stehen daher vor der Frage, wie sie ihre IT-Sicherheit strategisch neu ausrichten können. Im Interview stellen Stefan Rothmeier und Sebastian Fuchs von T.CON das Konzept »Zero Trust« vor und erläutern, wie die Umsetzung gelingt. First…
-
Attackers are exploiting AI faster than defenders can keep up, new report warns
Cybersecurity is entering “a new phase” as artificial intelligence tools have matured and given IT defenders significantly less time to respond to cyberattacks and other threats, according to a new report released Monday. The report, authored by federal contractor Booz Allen Hamilton, concludes that threat actors have adopted AI more quickly than governments and private…
-
Google Unveils Android 17 Advanced Protection Mode to Stop Malicious Services
Google is preparing to launch Android 17, introducing a comprehensive suite of new features aimed at fundamentally improving device security, user privacy, and performance debugging. At the forefront of this release is the highly anticipated Android Advanced Protection Mode (AAPM), a powerful new feature designed to safeguard users from increasingly sophisticated cyberattacks and stop malicious…
-
Google Unveils Android 17 Advanced Protection Mode to Stop Malicious Services
Google is preparing to launch Android 17, introducing a comprehensive suite of new features aimed at fundamentally improving device security, user privacy, and performance debugging. At the forefront of this release is the highly anticipated Android Advanced Protection Mode (AAPM), a powerful new feature designed to safeguard users from increasingly sophisticated cyberattacks and stop malicious…

