Stryker Cyber Attack: Handala Hackers Turn MDM into a Global MedTech Weak Point

Medical and cyber themes contrast in a split-scene with surgery and hacking.

Fortune 500 medical technology manufacturer Stryker has been hit by one of the most significant cyber attacks reported in the medtech sector in recent years. The hacking group Handala, believed to be linked to Iran, has claimed responsibility, asserting that it wiped data on hundreds of thousands of devices and stole tens of terabytes of … Read more

SocksEscort Proxy Botnet Dismantled: How AVRecon Turned Home Routers into a Criminal Proxy Network

FBI and Europol agents investigate a digital crime scene with servers and light effects.

US and European law enforcement agencies, supported by private-sector cybersecurity experts, have dismantled the SocksEscort proxy botnet — one of the most persistent and commercially successful residential proxy services built on infected Linux-based routers running the AVRecon malware. The coordinated operation delivers a significant blow to the criminal market for “clean” residential IP addresses and … Read more

CNCERT Flags OpenClaw Agentic AI as High Cybersecurity Risk for Enterprises

Group of people watching a train on a busy cityscape with a river and skyscrapers.

China’s National Computer Network Emergency Response Technical Team (CNCERT/CC) has published an official advisory warning that the OpenClaw agentic AI platform poses a “high security risk” in its default configuration. According to the bulletin, the way OpenClaw is typically deployed creates favorable conditions for large‑scale incidents, including credential theft and unauthorized access to critical corporate … Read more

Zombie ZIP: How a Malicious ZIP Archive Attack Evades Antivirus and EDR

Man examines a locked box emitting green smoke in a dimly lit room.

A new attack technique against ZIP archives, dubbed Zombie ZIP, demonstrates how seemingly harmless file formats can be weaponised to deliver malware while slipping past antivirus and endpoint detection and response (EDR) tools. The method, presented by security researcher Chris Aziz from Bombadil Systems, exploits how many security solutions trust ZIP file headers instead of … Read more

Stolen Google Gemini API Key Triggers $82K Bill and Exposes Hidden Google Cloud Security Risks

Contrast of a cheerful man at a desk and a hooded figure surrounded by screens.

A small startup from Mexico recently found itself facing an $82,314 Google Cloud bill after attackers abused a stolen Google Gemini API key for intensive AI queries over just two days. The incident highlights not only the risk of exposed API keys, but also architectural nuances in the Google Cloud and Gemini API ecosystem that … Read more

Microsoft March 2026 Patch Tuesday: What Security Teams Must Patch First

Mysterious figure ascending stairs amidst digital chaos and dark themes.

Microsoft’s March 2026 Patch Tuesday delivers more than 80 security fixes across Windows, Office and Azure services. The release includes two publicly disclosed 0‑day vulnerabilities and eight critical‑severity bugs, making this cycle particularly important for enterprise security and IT operations teams that manage large Windows and Microsoft 365 estates. Overview of March 2026 Microsoft security … Read more

Europol and Microsoft Disrupt Tycoon2FA, a Major MFA-Bypass Phishing-as-a-Service Platform

Worn keyboard with Google sign-in page, a key fob, and cookie crumbs.

International law-enforcement agencies, coordinated by Europol and technically supported by Microsoft, have dismantled the infrastructure of Tycoon2FA — one of the world’s most influential phishing‑as‑a‑service (PhaaS) platforms focused on bypassing multi‑factor authentication (MFA). During the operation, investigators disrupted the service and seized more than 330 domains, including operator control panels and phishing sites used in … Read more

Unencrypted TPMS Signals Enable Covert Vehicle Tracking

Engineers monitor smart traffic systems in a futuristic urban landscape.

Wireless tire pressure monitoring systems (TPMS), now mandatory in most new vehicles in the United States, European Union, and many other markets, have emerged as an unexpected tool for covert vehicle tracking. A team of researchers from Spain, Switzerland, and Luxembourg has demonstrated that cheap roadside radio receivers are sufficient to build a large-scale TPMS-based … Read more

Anthropic’s Claude Finds 22 Firefox Vulnerabilities: A Turning Point for AI in Application Security

Robot analyzing crystals labeled 'Critical', 'Moderate', and 'Low' in a dim environment.

A joint experiment by Anthropic and Mozilla has shown that large language models (LLMs) are already capable of identifying security flaws at industrial browser scale. In an automated security review of Firefox, the model Claude Opus 4.6 discovered 22 previously unknown vulnerabilities, many of them high severity. All issues have now been fixed in the … Read more

Phishing Campaign Abuses ip6.arpa and Reverse DNS to Bypass Domain Reputation

Team members analyze data in a dark, high-tech room with stormy visuals.

A newly documented phishing campaign analyzed by Infoblox demonstrates how attackers can weaponize the technical .arpa domain and reverse DNS for IPv6 to slip past email gateways and web filters. Instead of exploiting protocol-level vulnerabilities, the operators take advantage of gaps in DNS configuration policies and weaknesses in domain reputation checks. What is the .arpa … Read more