SUBSCRIBE
Tech Journal Now
  • Home
  • News
  • AI
  • Reviews
  • Guides
  • Best Buy
  • Software
  • Games
  • More Articles
Reading: CISA urges IT to harden endpoint management systems after cyberattack by pro-Iranian group – Computerworld
Share
Tech Journal NowTech Journal Now
Font ResizerAa
  • News
  • Reviews
  • Guides
  • AI
  • Best Buy
  • Games
  • Software
Search
  • Home
  • News
  • AI
  • Reviews
  • Guides
  • Best Buy
  • Software
  • Games
  • More Articles
Have an existing account? Sign In
Follow US
© Foxiz News Network. Ruby Design Company. All Rights Reserved.
Tech Journal Now > Software > CISA urges IT to harden endpoint management systems after cyberattack by pro-Iranian group – Computerworld
Software

CISA urges IT to harden endpoint management systems after cyberattack by pro-Iranian group – Computerworld

News Room
Last updated: March 20, 2026 1:14 am
News Room
Share
1 Min Read
SHARE

In a March 15 update Stryker said all connected, digital and life-saving technologies used by customers remain safe to use. “This event was contained to Stryker’s internal Microsoft environment, and as a result it did not affect any of our products—connected or otherwise,” the statement said. No ransomware or malware was deployed, the company added.

In the Stryker incident, attackers hijacked a tool that companies trust every day, and used it to shut down operations on a global scale, commented Ismael Valenzuela, vice-president of threat intelligence at Arctic Wolf. “By abusing Microsoft Intune, they were able to remotely wipe more than 200,000 devices across 79 countries. The lesson is clear: no single login should ever have the power to cause irreversible damage,” he said.

“Destructive administrative operations like device wipes, mass policy changes, or tenant‑wide updates must require multiple approvals,” he added. “No one session, credential, or role should be able to take destructive action at scale without independent authorization. Organizations should immediately lock down endpoint management tools by tightly limiting admin access, enforcing multi‑party approvals, and continuously monitoring privileged activity so trusted platforms don’t become single points of failure.”

Read the full article here

You Might Also Like

Microsoft won’t force Copilot in everywhere after all – Computerworld

Microsoft shuffles leadership as Copilot and AI agents reshape its core products – Computerworld

customer-service bots that code for free – Computerworld

Global RAM shortage appears set to continue through 2027 – Computerworld

Windows shell spoofing vulnerability puts sensitive data at risk – Computerworld

Share This Article
Facebook Twitter Email Print
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Trending Stories

Games

Microsoft ended MS-DOS support 20 years ago, but the latest update for the best roguelike ever made still supports it anyway

May 5, 2026
Games

I never understood the appeal of a jumbo novelty d20 until I saw one inspired by one of my favorite new RPGs

May 4, 2026
News

Amazon turns its logistics empire into a new business, taking on UPS and FedEx in freight and shipping – GeekWire

May 4, 2026
Games

Gabe Newell makes surprise appearance in an ad for the yacht company he bought last year, riding around in his $500 million boat

May 4, 2026
News

Peter Thiel leads $140M round for Panthalassa’s wave-powered AI

May 4, 2026
Games

Diablo 4: Lord of Hatred players seem close to finding the secret cow level and the final clue might be on a newly discovered cow island

May 4, 2026

Always Stay Up to Date

Subscribe to our newsletter to get our newest articles instantly!

Follow US on Social Media

Facebook Youtube Steam Twitch Unity

2024 © Prices.com LLC. All Rights Reserved.

Tech Journal Now

Quick Links

  • Privacy Policy
  • Terms of use
  • For Advertisers
  • Contact
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?