Stryker tells SEC that timeline for recovery from cyberattack unknown

In an 8-K filing with the SEC, Stryker confirmed that the cyberattack caused a global disruption to the company’s Microsoft environment and said external cybersecurity experts were brought in to “assess and to contain the threat.”

The Record from Recorded Future News – ​Read More

Meta Launches New Protection Tools as It Helps Disrupt Scam Centers

The social media giant has disabled more than 150,000 accounts powering scam centers in Asia.

The post Meta Launches New Protection Tools as It Helps Disrupt Scam Centers appeared first on SecurityWeek.

SecurityWeek – ​Read More

After decades with Linux, I tried to use Windows 11 – and found 9 glaring issues

Going from Linux to Windows felt like taking one step forward and two steps back. Here’s a list of what went wrong.

Latest news – ​Read More

Is there a Windows PC alternative to the Mac Mini? This one I tested is so close (yet so far)

The palm-sized Blackview MP20 runs cool and quiet and handles everyday computing tasks – with a few notable drawbacks.

Latest news – ​Read More

Fake government and Starlink apps used in malware campaign targeting Brazil

The malware, dubbed BeatBanker by Russian cybersecurity firm Kaspersky, infects smartphones through fake applications that mimic legitimate services, including the Starlink satellite internet app and the Brazilian government portal INSS Reembolso.

The Record from Recorded Future News – ​Read More

Splunk, Zoom Patch Severe Vulnerabilities

Critical- and high-severity flaws could be exploited to execute arbitrary shell commands or elevate privileges.

The post Splunk, Zoom Patch Severe Vulnerabilities appeared first on SecurityWeek.

SecurityWeek – ​Read More

JBL’s latest headphones offer an Auracast loophole Apple won’t be happy about

With one simple app feature, JBL’s headphones open an otherwise closed-off feature to iOS fans.

Latest news – ​Read More

Why Moltbook and OpenClaw are the fool’s gold in our AI boom

Commentary: Whatever Meta and OpenAI paid, it was too much. Other, better programs can do the same jobs.

Latest news – ​Read More

Critical N8n Vulnerabilities Allowed Server Takeover

The bugs allowed unauthenticated attackers to execute arbitrary code, steal credentials, and take over servers.

The post Critical N8n Vulnerabilities Allowed Server Takeover appeared first on SecurityWeek.

SecurityWeek – ​Read More

Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets

Cybersecurity researchers have discovered half-a-dozen new Android malware families that come with capabilities to steal data from compromised devices and conduct financial fraud.
The Android malware range from traditional banking trojans like PixRevolution, TaxiSpy RAT, BeatBanker, Mirax, and Oblivion RAT to full-fledged remote administration tools such as SURXRAT.
PixRevolution, according to

The Hacker News – ​Read More