Archiv für März 2026

📄

Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker

A hacktivist group with links to Iran’s intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker’s largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker’s main U.S. headquarters says the company is currently experiencing a building emergency.

Mehr lesen →
📄

FLIPPER FRIENDS™: ALL-LEGENDS TOURNAMENT SERIES | SEASON 2: WEEK 7

sponsored blog post Legends players, Week 7 is here – time to keep the competition rolling! Season 2 continues with a fresh mix of exciting gameplay, challenging tables, and leaderboard action. Compete from your Legends 4K™, HDP™, or HD Pinball device and climb the ranks for your chance to win AtGames Gift Card rewards. This […]

Mehr lesen →
📄

FLIPPER FRIENDS™ JUNIOR LEAGUE IS COMING – GET READY!

sponsored blog post Legends Families, Big News! In partnership with the IFPA, AtGames is excited to launch an all-new tournament series designed for young pinball players aged 15 and under! Players under 15 can compete on fun, young player- and family-friendly tables, including TMNT, Police Patrol, Firefighter: Wildlands, Dinosaur Dynasty, The Last Ice Age, and […]

Mehr lesen →
📄

Tool updates: lots of security and logic fixes, (Mon, Mar 23rd)

So, I've been slow to get on the Claude Code/OpenCode/Codex/OpenClaw bandwagon, but I had some time last week so I asked Claude to review (/security-review) some of my python scripts. He found more than I'd like to admit, so I checked in a bunch of updates. In reviewing his suggestions, he was right, I made some stupid mistakes, some of which have been sitting in there for a long time. It was nothing earth-shattering and it took almost no time for Claude, it took longer for me to read through the updates he wanted to make, figure out what he was seeing, and decide whether to accept them or tweak them. Here are a few of them.

Mehr lesen →
📄

Detecting IP KVMs, (Tue, Mar 24th)

I have written about how to use IP KVMs securely, and recently, researchers at Eclypsium published yet another report on IP KVM vulnerabilities. But there is another issue I haven't mentioned yet with IP KVMs: rogue IP KVMs. IP KVMs are often used by criminals. For example, North Koreans used KVMs to connect remotely to laptops sent to them by their employers. The laptops were located in the US, and the North Korean workers used IP KVMs to remotely connect to them. IP KVMs could also be used to access office PCs, either to enable undetected „work from home“ or by threat actors who use them to gain remote access after installing the device on site.

Mehr lesen →
📄

Feds Disrupt IoT Botnets Behind Huge DDoS Attacks

The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million hacked Internet of Things (IoT) devices, such as routers and web cameras. The feds say the four botnets — named Aisuru, Kimwolf, JackSkid and Mossad — are responsible for a series of recent record-smashing distributed denial-of-service (DDoS) attacks capable of knocking nearly any target offline.

Mehr lesen →
📄

‘CanisterWorm’ Springs Wiper Attack Targeting Iran

A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and wipes data on infected systems that use Iran’s time zone or have Farsi set as the default language.

Mehr lesen →