CISA Adds Five Known Exploited Vulnerabilities to Catalog

CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-31277 Apple Multiple Products Buffer Overflow Vulnerability CVE-2025-32432 Craft CMS Code Injection Vulnerability CVE-2025-43510 Apple Multiple Products Improper Locking Vulnerability CVE-2025-43520…

News brief: Stryker recovering after large-scale cyberattack

<div></div> <div> <div> <p paraeid=”{82bb4c45-7afe-4e77-8131-35bf588a6ef6}{39}” paraid=”1570770248″><span xml:lang=”EN-US” data-contrast=”auto”>More than a week after the blistering&nbsp;March 11&nbsp;cyberattack&nbsp;on Stryker,&nbsp;the&nbsp;Michigan-based&nbsp;medtech&nbsp;company continues&nbsp;to restore systems&nbsp;to&nbsp;resume&nbsp;normal operations.</span><span data-ccp-props=”{}”>&nbsp;</span></p> </div> <div> <p paraeid=”{82bb4c45-7afe-4e77-8131-35bf588a6ef6}{79}” paraid=”51152698″><span xml:lang=”EN-US” data-contrast=”auto”>The attack,&nbsp;claimed by Iran-linked threat actor&nbsp;Handala,&nbsp;affected&nbsp;the company’s&nbsp;ordering, processing,&nbsp;shipping&nbsp;and&nbsp;manufacturing.&nbsp;In a post on X,&nbsp;Handala&nbsp;asserted&nbsp;that it&nbsp;wiped&nbsp;data&nbsp;from&nbsp;200,000&nbsp;systems,&nbsp;servers,&nbsp;laptops&nbsp;and…

Cyber Briefing: 2026.03.20

DarkSword iOS exploits emerge, zero-days targeted, supply-chain malware spreads, phishing scams rise, botnets dismantled, and fraud cases surface. This article has been indexed from CyberMaterial Read the original article: Cyber Briefing: 2026.03.20