War spreads into cyberspace after Iran-linked hackers hit medtech giant Stryker

An Iran-linked hacking group has claimed responsibility for a cyberattack on U.S. medical device giant Stryker, marking a potential escalation of cyber activity tied to the ongoing conflict in the Middle East. Stryker confirmed in a Form 8-K filing wit… Continue reading War spreads into cyberspace after Iran-linked hackers hit medtech giant Stryker

Fortanix helps enterprises build resilience with multi-sourced quantum entropy

Fortanix announced a new multi-sourced quantum entropy capability within Fortanix Data Security Manager (DSM), enabling enterprises to diversify encryption key generation at the origin of trust. Through partnerships with Qrypt and Quantum Dice, Fortani… Continue reading Fortanix helps enterprises build resilience with multi-sourced quantum entropy

Anthropic forms institute to study long-term AI risks facing society

Anthropic has established the Anthropic Institute, a research unit focused on studying the societal effects of AI and informing policy responses to risks from more advanced systems. “In the five years since Anthropic began, AI progress has moved incred… Continue reading Anthropic forms institute to study long-term AI risks facing society

YouTube draws a line on deepfakes involving politicians and journalists

With deepfakes becoming more common, YouTube has expanded access to its AI-driven likeness detection system to a pilot group of government officials, journalists and political candidates. The step follows an earlier rollout of the tool to creators in t… Continue reading YouTube draws a line on deepfakes involving politicians and journalists

Software vulnerabilities push credential abuse aside in cloud intrusions

Cloud intrusions are unfolding on shorter timelines, with attackers leaning more on unpatched software and compromised identities. H2 2025 distribution of initial access vectors exploited in Google Cloud (Source: Google) Google Cloud’s Cloud Threat Hor… Continue reading Software vulnerabilities push credential abuse aside in cloud intrusions

Microsoft flips Windows Autopatch to default hotpatch security updates

Microsoft is changing the default behavior in Windows Autopatch so that hotpatch security updates are enabled automatically for eligible devices managed through Microsoft Intune or the Microsoft Graph API starting with the May 2026 Windows security upd… Continue reading Microsoft flips Windows Autopatch to default hotpatch security updates

Phishing campaign spoofs local officials to steal permit fees

The FBI is warning about a phishing scheme in which cybercriminals impersonate city and county officials to solicit fraudulent payments for planning and zoning permits. Criminals mine publicly available permit data to find likely targets and make their… Continue reading Phishing campaign spoofs local officials to steal permit fees

Russian hackers crack into officials’ Signal and WhatsApp accounts

Russian state hackers are trying to break into Signal and WhatsApp accounts used by diplomats, military staff, and government officials worldwide, Dutch intelligence agencies warned. They believe journalists and other people who attract attention from … Continue reading Russian hackers crack into officials’ Signal and WhatsApp accounts

No more soft play, President Trump warns in new cyber strategy

The White House released “President Trump’s Cyber Strategy for America,” a policy framework outlining the administration’s priorities for maintaining U.S. leadership in cyberspace. The seven-page cyber strategy commits to a coordinated, government-wide… Continue reading No more soft play, President Trump warns in new cyber strategy