SUBSCRIBE
Tech Journal Now
  • Home
  • News
  • AI
  • Reviews
  • Guides
  • Best Buy
  • Software
  • Games
  • More Articles
Reading: CISA urges IT to harden endpoint management systems after cyberattack by pro-Iranian group – Computerworld
Share
Tech Journal NowTech Journal Now
Font ResizerAa
  • News
  • Reviews
  • Guides
  • AI
  • Best Buy
  • Games
  • Software
Search
  • Home
  • News
  • AI
  • Reviews
  • Guides
  • Best Buy
  • Software
  • Games
  • More Articles
Have an existing account? Sign In
Follow US
© Foxiz News Network. Ruby Design Company. All Rights Reserved.
Tech Journal Now > Software > CISA urges IT to harden endpoint management systems after cyberattack by pro-Iranian group – Computerworld
Software

CISA urges IT to harden endpoint management systems after cyberattack by pro-Iranian group – Computerworld

News Room
Last updated: March 20, 2026 1:14 am
News Room
Share
1 Min Read
SHARE

In a March 15 update Stryker said all connected, digital and life-saving technologies used by customers remain safe to use. “This event was contained to Stryker’s internal Microsoft environment, and as a result it did not affect any of our products—connected or otherwise,” the statement said. No ransomware or malware was deployed, the company added.

In the Stryker incident, attackers hijacked a tool that companies trust every day, and used it to shut down operations on a global scale, commented Ismael Valenzuela, vice-president of threat intelligence at Arctic Wolf. “By abusing Microsoft Intune, they were able to remotely wipe more than 200,000 devices across 79 countries. The lesson is clear: no single login should ever have the power to cause irreversible damage,” he said.

“Destructive administrative operations like device wipes, mass policy changes, or tenant‑wide updates must require multiple approvals,” he added. “No one session, credential, or role should be able to take destructive action at scale without independent authorization. Organizations should immediately lock down endpoint management tools by tightly limiting admin access, enforcing multi‑party approvals, and continuously monitoring privileged activity so trusted platforms don’t become single points of failure.”

Read the full article here

You Might Also Like

3 Android theft protection additions you should absolutely activate – Computerworld

A guide to the updates – Computerworld

Happy Data Privacy Week from Apple – Computerworld

Workers, bosses, disagree on whether AI will create jobs – Computerworld

First reviews and analyst reactions – Computerworld

Share This Article
Facebook Twitter Email Print
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Trending Stories

Games

Crimson Desert deluxe and pre-order special items are inaccessible for some, but Pearl Abyss is working on a fix

March 20, 2026
Games

Hoarder is what happens when a Darkwood co-creator makes a cleaning simulator: Your job is to clean the abyss and ‘no one is coming to save you’

March 20, 2026
Games

The best Fallout game is 99 cents right now

March 20, 2026
News

Sidewalk scooter riders, beware: AI-powered ‘Lime Vision’ will soon call you out

March 20, 2026
Games

All Seven Deadly Sins: Origin codes in March 2026 for extra draw tickets, cube keys, and more

March 20, 2026
News

Got space junk? Portal and Paladin team up to create an orbital trash disposal service

March 19, 2026

Always Stay Up to Date

Subscribe to our newsletter to get our newest articles instantly!

Follow US on Social Media

Facebook Youtube Steam Twitch Unity

2024 © Prices.com LLC. All Rights Reserved.

Tech Journal Now

Quick Links

  • Privacy Policy
  • Terms of use
  • For Advertisers
  • Contact
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?