Tag: cyberattack
-
Notfall-Onboarding scheitert ohne die richtige Vorbereitung – DDoS-Resilienz entscheidet sich schon lange vor dem Angriff
First seen on security-insider.de Jump to article: www.security-insider.de/ddos-resilienz-notfall-onboarding-vorbereitung-mitigation-a-4b513bede48cbe6b3cfa9017f8280abd/
-
Hackers tried to breach Poland’s nuclear research centre
Poland’s National Centre for Nuclear Research (NCBJ) thwarted a cyberattack targeting its IT infrastructure. The attempted intrusion was detected and blocked before attackers … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/16/poland-nuclear-research-centre-cyberattack/
-
IT-Sicherheit: Cyberangriffe kosten Autosektor über 20 Milliarden Dollar
Eine Analyse von CAM und Cisco zeigt: Die Schäden durch Cyberattacken im Automobilsektor haben sich seit 2022 verzwanzigfacht. First seen on golem.de Jump to article: www.golem.de/news/it-sicherheit-cyberangriffe-kosten-autosektor-ueber-20-milliarden-dollar-2603-206522.html
-
China Demands Proof After Costa Rica Blames UNC2814 for ICE Cyberattack
Tensions between China and Costa Rica have intensified following allegations tied to an ICE cyberattack that Costa Rican authorities say was linked to the cyberespionage group UNC2814. The dispute centers on a breach affecting Costa Rica’s state-run electricity and telecommunications provider and has quickly evolved from a domestic cybersecurity issue into a diplomatic disagreement involving competing narratives and…
-
Wie KI Cyberangriffe skaliert
Der Cloudflare Threat Report zeichnet das Bild einer hochgradig industrialisierten Bedrohungslandschaft, in der Effizienz und Skalierung wichtiger sind als technische Finesse. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/wie-ki-cyberangriffe-skaliert
-
Wie KI Cyberangriffe skaliert
Der Cloudflare Threat Report zeichnet das Bild einer hochgradig industrialisierten Bedrohungslandschaft, in der Effizienz und Skalierung wichtiger sind als technische Finesse. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/wie-ki-cyberangriffe-skaliert
-
Wie KI Cyberangriffe skaliert
Der Cloudflare Threat Report zeichnet das Bild einer hochgradig industrialisierten Bedrohungslandschaft, in der Effizienz und Skalierung wichtiger sind als technische Finesse. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/wie-ki-cyberangriffe-skaliert
-
Wie KI Cyberangriffe skaliert
Der Cloudflare Threat Report zeichnet das Bild einer hochgradig industrialisierten Bedrohungslandschaft, in der Effizienz und Skalierung wichtiger sind als technische Finesse. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/wie-ki-cyberangriffe-skaliert
-
Phishing-Angriffe zu Feiertagen: Ostern droht wieder ein saisonaler Höhepunkt
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/phishing-angriffe-feiertage-ostern-saisonal-hoehepunkt
-
Mikrosegmentierung: Neue Strategie für Prävention, Resilienz und Sicherheit
Mittels automatisierter Mikrosegmentierung können Unternehmen die möglichen Folgen eines Cyberangriffs effizient und effektiv eindämmen. Zero Networks analysierte über einen Zeitraum von zwölf Monaten (Dezember 2024 bis Dezember 2025) etwa 3,4 Billionen Aktivitäten in 400 Unternehmensumgebungen. Ziel war es, zu verstehen, wie sich erfolgreiche Cyberangriffe nach dem ersten Zugriff weiterentwickeln. Das Ergebnis: Die gefährlichsten Aktivitäten… First…
-
AiLock Ransomware Claims England Hockey Data Breach
England Hockey is investigating a potential cyberattack claimed by the AiLock ransomware group. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/ailock-ransomware-claims-england-hockey-data-breach/
-
Hackers targeted Poland’s National Centre for Nuclear Research
Hackers targeted Poland’s National Centre for Nuclear Research, but security systems detected and blocked the attack before any damage. The National Centre for Nuclear Research in Poland reported a cyberattack on its IT infrastructure. The intrusion attempt was quickly detected by security systems, allowing staff to secure the targeted systems and prevent any operational impact.…
-
How SMBs Can Proactively Strengthen Cybersecurity
Tags: access, attack, best-practice, business, ciso, compliance, control, cyber, cyberattack, cybercrime, cybersecurity, data, identity, infrastructure, resilience, risk, service, tool, updateCyber attackers increasingly target SMBs because they are often the easiest path into larger supply chains. As cyberattacks are ramping up, specifically against Critical Infrastructure sectors, Small and Medium Businesses (SMBs) are feeling the pressure and asking what they can do to better protect themselves in reasonable ways. Don’t Accept Failure SMBs often feel overwhelmed when…
-
How Main Line Health Secures Devices With Microsegmentation
An identity-based microsegmentation deployment at Main Line Health in Philadelphia is helping to control how its roughly 60,000 devices communicate across the network in order to protect clinical operations and limit the impact of potential cyberattacks, said Main Line Health CISO Aaron Weismann. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/how-main-line-health-secures-devices-microsegmentation-i-5539
-
Poland’s nuclear research centre targeted by cyberattack
Poland’s National Centre for Nuclear Research (NCBJ) says hackers targeted its IT infrastructure, but the attack was detected and blocked before causing any impact. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/polands-nuclear-research-centre-targeted-by-cyberattack/
-
Stryker’s manufacturing, shipping disrupted after cyberattack
Tags: cyberattackThe medtech company says it’s still experiencing issues with order processing, manufacturing and shipping.; First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/strykers-manufacturing-shipping-disrupted-cyberattack/814693/
-
Ransomware incident responder gave info to BlackCat cybercriminals during negotiations, DOJ alleges
U.S. prosecutors accused an incident responder of conducting cyberattacks and helping ransomware gangs negotiate higher payouts from the same victims he was working for. First seen on therecord.media Jump to article: therecord.media/ransomware-blackcat-doj-incident-responder
-
Iran-Linked Hacktivists Claim Destructive Cyberattack on Medtech Firm Stryker
A hacktivist group with alleged links to Iran’s intelligence agencies has claimed responsibility for a destructive cyberattack against Stryker, the Michigan-based global medical technology company, in an incident that reportedly disrupted operations across the company’s international network. News reports from Ireland, Stryker’s largest hub outside the United States, said the company sent more than 5,000…
-
The Cyber Express Weekly Roundup: Global Cyberattacks, Espionage, Malware, and Critical Security Updates
This week’s The Cyber Express weekly roundup highlights major cybersecurity developments affecting organizations, governments, and individuals worldwide. Key stories include destructive cyberattacks, such as system-wide wipes and targeted breaches, as well as state-backed cyber espionage targeting technology and research sectors. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/the-cyber-express-weekly-roundup-march/
-
Mehr staatliche Cyberangriffe auf europäische und nahöstliche Regierungen
Tags: cyberattackDer militärische Konflikt im Nahen Osten hat längst auch eine digitale Dimension erreicht. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/staatliche-cyberangriffe-europaische-regierungen
-
Die Grenzen des Pentestings: Simulierter Angriff, echte Schwäche
Viele Unternehmen haben Penetration Testing fest in ihrer Sicherheitsstrategie verankert. Das ist eine gute Basis, allerdings greift diese Maßnahme meist zu kurz. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cloud-security/die-grenzen-des-pentestings
-
Iran MOIS Colludes With Criminals to Boost Cyberattacks
Iranian APTs have long pretended to be cybercriminal groups. Now they’re working with actual cybercriminal groups. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/iran-mois-criminals-cyberattacks
-
Medical giant Stryker crippled after Iranian hackers remotely wipe computers
Tags: access, attack, authentication, best-practice, ceo, computer, credentials, cyber, cyberattack, data, flaw, group, hacker, identity, infrastructure, intelligence, iran, jobs, mobile, phone, service, software, supply-chain, theft, threat, updateHandala claims credit: The Handala threat group quickly claimed responsibility for the attack. While the group’s involvement is just a claim for now, Stryker employees reportedly saw a version of the Handala logo a cartoon of a Palestinian boy with his back turned and hands crossed behind him on affected devices.Handala’s identity is hard to…
-
Inside the Tehran-Linked ‘Faketivist’ Hacking Group Handala
Healthcare Hit Shows Symbols Matter as Iran Shifts Focus to Economic Damage. Cybersecurity experts say that the Handala hacktivist group that claimed credit for attacks against two American firms on Wednesday is run by the Iranian government. The shift to destructive cyberattacks parallels Iran’s attempt to inflict greater economic damage on the United States and…
-
Inside the Tehran-Linked ‘Faketivist’ Hacking Group Handala
Healthcare Hit Shows Symbols Matter as Iran Shifts Focus to Economic Damage. Cybersecurity experts say that the Handala hacktivist group that claimed credit for attacks against two American firms on Wednesday is run by the Iranian government. The shift to destructive cyberattacks parallels Iran’s attempt to inflict greater economic damage on the United States and…
-
Why Stryker’s Outage Is a Disaster Recovery Wake-Up Call
The Iranian cyberattack on Stryker is the kind of stress test that business continuity and disaster recovery programs often do not plan for. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/stryker-outage-disaster-recovery-wake-up-call
-
Destructive Activity Targeting Stryker Highlights Emerging Supply Chain Risks
On March 11th, medical technology company Stryker disclosed that a cyberattack had disrupted portions of its global network infrastructure, affecting Microsoft systems used across the organization. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/destructive-activity-targeting-stryker-highlights-emerging-supply-chain-risks/
-
Iran-Linked Hacktivists Hit Stryker, Knocking Employees Offline Across Multiple Countries
A cyberattack disrupted global operations at medical device maker Stryker, knocking employees offline and raising concerns about destructive wiper attacks. The post Iran-Linked Hacktivists Hit Stryker, Knocking Employees Offline Across Multiple Countries appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-stryker-cyberattack-global-systems-disruption/
-
Stryker investigating cyberattack that caused widespread outage
The full scope of the impact on the medical equipment firm, including operational and financial effects, remains unclear. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/stryker-outage-Iran-cyberattack/814497/

