Vulnerability
Security researchers at Check Point Research discovered a vulnerability in ChatGPT’s analysis environment. Data exfiltration was possible through a channel that OpenAI apparently overlooked.
LinkedIn login scam
A new phishing campaign uses convincing LinkedIn notifications to lure users to fake login pages. The emails are so well crafted that even cautious users might fall for them.
Expert warns partners
Just one day after the massive attack, Stryker declared the incident “contained.” An incident response engineer explains why that assessment may be premature and why new screenshots are cause for concern.
200,000 devices allegedly wiped
The hacker group Handala claims to have destroyed more than 200,000 systems belonging to US corporation Stryker and stolen 50 terabytes of data. Offices in 79 countries are said to be affected.
Cyberattacks after US-Israel offensive
Following the joint US-Israel military strikes against Iran on February 28, 2026, the cyber front is escalating rapidly.
Criminals study cycles
Organisations assume cyber threats remain constant throughout the year, spreading risk evenly across all four quarters. This misconception leaves them vulnerable during a period when attackers are most active.
Breakout time shrinks
Attackers now need an average of just 29 minutes to move laterally through a network after gaining initial access, a 65 percent acceleration compared to the previous year.
PromptSpy: The malware that thinks
Security researchers at Slovak IT company ESET have discovered a new Android malware that actively leverages Google Gemini during live operation, marking the first time an Android threat has used generative AI not as a peripheral feature, but as its central control mechanism.
Opportunity makes a thief
Anyone who believes ransomware groups meticulously select their targets based on industry, location, or strategic importance is usually mistaken.
Most Read Articles
19. March 2026
12. March 2026