theinfosecnews
CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634
Allvulnerability70malware15policy14breach5apt3ransomware1
Mmalware

Iran-Linked Handala Hacktivist Group Executes Data-Wiping Attack on Stryker Using Microsoft Intune

The Iranian-linked hacktivist group Handala launched a global data-wiping attack on medical device maker Stryker using Microsoft Intune's remote wipe capabilities. The attack disrupted operations in 79 countries, wiping over 200,000 devices and impacting healthcare supply chains. Detection involves monitoring unusual Intune activity, and remediation includes revoking credentials and restoring from backups.

Krebs on Security·22d ago·3 min read
Mmalware

Starkiller Phishing-as-a-Service: Real-Time Session Hijacking and MFA Bypass

Starkiller is a phishing-as-a-service platform that proxies victims’ interactions with legitimate login pages to capture credentials and bypass MFA. Delivered by the Jinkusu threat group, it uses Docker-based headless Chrome instances to relay real-time sessions and harvest authentication tokens. This service circumvents traditional detection and lowers the technical bar for cybercriminals.

Krebs on Security·41d ago·2 min read
Mmalware

Kimwolf IoT Botnet Disrupts I2P Network in Failed Sybil Attack

The Kimwolf IoT botnet recently attempted a Sybil attack on the I2P network by flooding it with hundreds of thousands of infected devices, causing severe disruptions. Kimwolf operators use I2P and similar anonymity networks as fallback command and control channels to evade takedown efforts. Detection involves monitoring network anomalies and known IoT malware signatures; removal requires firmware patching and network segmentation.

Krebs on Security·50d ago·2 min read