There Is A Deepfake Attack Every 5 Minutes Says Unidata

Posted in Commentary with tags on March 12, 2026 by itnerd

Deepfake fraud incidents jumped 257% in 2024 alone. In Q1 2025, more deepfake incidents were recorded than in all of 2024 combined. A deepfake attempt now hits an identity verification system every five minutes.

This is why iBeta Level 3 was launched in mid-2025 — the most demanding face anti-spoofing certification ever created.

Here’s what makes it unlike anything before:

  • Attackers get up to 7 days and unlimited budget to defeat your system
  • Hyper-realistic silicone masks built by professional special-effects artists
  • Deepfakes engineered to blink, smile, and respond to liveness prompts on command
  • Only systems blocking 95%+ of attacks pass — no exceptions

For context: Level 1 testers spend $30 and 8 hours. Level 3 has no cost ceiling.

The financial stakes are real: generative AI fraud losses are projected to hit $40 billion in the US by 2027. Deepfakes already account for 40% of all biometric fraud attempts. The tools to create them are cheap, accessible, and getting better every month.

They have published a detailed breakdown of what Level 3 actually tests, how it compares to previous standards, what vendors keep getting wrong before certification, and — perhaps most overlooked — why children’s biometrics remains a dangerous blind spot with no official testing track.

Full article: https://unidata.pro/blog/ibeta-level-3-new-standards/ 

University of Mississippi Medical Center Hack Claimed by Medusa

Posted in Commentary with tags on March 12, 2026 by itnerd

A ransomware group called Medusa today took credit for last month’s cyber attack on the University of Mississippi Medical Center.

UMMC shut down its clinics and cancelled appointments from February 19 to March 2, 2026 to contain the attack. The medical center lost access to phone lines, email, and patient records. 

Commenting on this news is Rebecca Moody, Head of Data Research at Comparitech: 

“The fact that Medusa has now added UMMC to its data leak site suggests a ransom hasn’t been paid — for the data at least. And its demand of $800,000, which is double the average across its other confirmed healthcare attacks from this group, could be for a number of reasons. It may be because Medusa believes the data it’s stolen from UMMC is of a higher value than others, or it could be because of how much publicity the attack has received. 

Whatever the reasoning for the high ransom and whatever the data is that has potentially been stolen, UMMC needs to provide patients and employees with an update as soon as possible. According to our data, the average breach on a healthcare provider following an attack via Medusa involves 195,000 records, which is a significant figure. Understandably, it takes organizations a long time to analyze the breached data and identify everyone who’s been affected (Bell Ambulance is a prime example with its recent increase in those affected from 114,000 to nearly 238,000), but if all employees and patients are aware of a potential data breach from the offset, it helps them mitigate the risks involved with a data leak. 

Anyone whose data is associated with UMMC should start monitoring their accounts for any unauthorized activity and should be on high alert for any potential phishing campaigns, especially those purporting to be from UMMC.”

Once again, healthcare is the target for threat actors. At this point this is not new information. The problem is that this keeps happening. And this needs to stop ASAP as attacks on the healthcare sector are out of control.

BlackSanta malware campaign targets HR departments with EDR-killing payload 

Posted in Commentary with tags on March 12, 2026 by itnerd

Researchers at Aryaka have identified a year-long cyber campaign with attackers sending messages containing links to files disguised as job applications or resumes to corporate HR departments that injects malware, dubbed BlackSanta, designed to disable security tools before stealing data.

The attack typically starts with victims downloading an ISO file hosted on cloud storage services, which contains seemingly legitimate documents and scripts. When opened, the file executes commands that download additional payloads and deploy the BlackSanta malware. The module functions as an “EDR killer,” disabling antivirus and endpoint detection and response tools at the kernel level, allowing attackers to operate on compromised systems with minimal resistance.

Once security controls are disabled, the malware can perform system reconnaissance, harvest credentials, and exfiltrate sensitive data from the compromised network. Researchers say the campaign specifically targets HR workflows because recruitment staff routinely open files from external applicants and may not scrutinize attachments as closely as security or IT teams, making them a practical entry point into enterprise environments.

Jacob Krell, Senior Director: Secure AI Solutions & Cybersecurity, Suzu Labs:

   “HR is a very practical point of entry. This has been a common attack path for a long time, so much so that fake resumes and job applications are taught as phishing lures because they work. HR staff are constantly interacting with unknown external people, opening files, and following up on inbound submissions as part of normal business, which makes them much easier to target than users in IT or finance, who are usually more security conscious and more conditioned to be suspicious.

   “A foothold is a foothold. Attackers do not need to land on the most privileged user first if they can compromise a softer target, establish access, and move laterally from there. HR is attractive because it combines lower resistance with real value. Even if it does not always have the same technical access as IT or the same direct financial access as finance, it often holds a broad set of personal information on both employees and applicants. That data can be stolen, resold, reused in future phishing and social engineering, or leveraged for broader fraud and identity theft.

   “This is not some new or surprising attack path. Most of the tradecraft involved is well known and has become fairly standard across the criminal ecosystem. Using an ISO to get past boundary level detections is a common technique, and the layered execution and EDR tampering here are a good example of how capabilities that once felt more specialized have become easier to obtain and reuse.

   “That broader commercialization matters. Advanced tooling, stolen information, and even direct access are now routinely bought, sold, shared, and reused, which keeps lowering the barrier to entry.”

Rajeev Raghunarayan, Head of GTM, Averlon:

   “The bigger risk isn’t the initial HR compromise. It’s what those compromised credentials or systems can reach. In many environments, HR processes intersect with identity and access workflows, which means an initial foothold can potentially lead to broader access across the organization if permissions and controls are not tightly managed.

   “Many environments still have overly broad permissions that allow attackers to move laterally once they gain a foothold. Organizations need to understand how identities and privileges become part of attack chains, not just focus on the endpoint where the malware first lands.”

Noelle Murata, Sr. Security Engineer, Xcape, Inc.:

   “The BlackSanta campaign utilizes malicious ISO files disguised as job applications to deliver a specialized “EDR killer” payload to corporate targets. This malware operates at the kernel level to systematically disable antivirus and endpoint detection tools, effectively blinding security operations centers before data exfiltration begins.

   “For security professionals, this represents a critical escalation in the arms race between attackers and defensive telemetry. When an adversary can reliably neuter the primary visibility tool of the modern enterprise, the entire incident response playbook is rendered obsolete. While HR departments remain a vulnerable entry point due to their operational need to open external files, the true threat lies in the sophisticated ability of this malware to achieve total silence on the host.

   “Defenders must pivot toward a defense-in-depth strategy that includes robust application control and the enforcement of “least privilege” for kernel-level drivers. Implementing hardware-backed security features and isolated environments for processing untrusted external documents can help mitigate the risk when endpoint agents are compromised.

   “If the EDR can’t see the fire, the whole building burns down before the first alarm sounds.”

This is a scary one as this attack kills the canary in the coal mine so there are no warnings. Thus it’s a good time to look at what you can do to make this less of a threat.

Guest Post: Pro-Iranian Hackers Are Ramping Up Attacks – and Cyberwar Is Spilling into Everyday Life

Posted in Commentary with tags on March 12, 2026 by itnerd

By Stefanie Schappert

From hospital supply chains to payment networks, the latest Iran-linked cyber threats show how geopolitical retaliation can disrupt the companies and services people depend on every day.

Verifone and Stryker Bring Cyberwar Closer to Home

Verifone and Stryker are the clearest signs yet that cyberwar is no longer confined to government agencies or military systems.

In less than a day on Wednesday, the Iran-linked hacktivist group Handala claimed attacks on both companies – Verifone, a major payments provider with strong ties to Israel, and Stryker, one of the biggest medical technology firms in the US.

In Stryker’s case, the fallout appeared far bigger than ordinary corporate IT downtime.

The group claimed it wiped more than 200,000 systems, servers, and mobile devices and stole 50TB of data. It also said the attack forced shutdowns across Stryker offices in 79 countries, though Stryker says it operates in 61 countries and impacts more than 150 million patients annually.

What’s more, more than 5,000 workers at Stryker’s Ireland hub were reportedly sent home, while healthcare providers in the US struggled to order surgical supplies through the company, according to KrebsOnSecurity. 

AOL reported that the disruption also affected Lifenet, a platform used by emergency responders to send patient data to hospitals.

That is what makes this story more than another burst of geopolitical cyber noise – it shows how retaliation abroad can hit the companies and systems ordinary people rely on every day.

Iran-Linked Threats Are Already Multiplying Online

The threat is not limited to one or two headline-grabbing incidents. In an early March advisory, Sophos warned that likely tactics could include website defacements, DDoS attacks, ransomware, destructive wipers, hack-and-leak operations, phishing, and password spraying.

Researchers also say the infrastructure for the next wave may already be in place. ThreatLabz identified more than 8,000 newly registered domains tied to the Middle East conflict, warning that many may still be “weaponized or used in threat campaigns in the near future.”

The lures include fake news blogs, conflict-themed malware files, and other content designed to exploit panic and curiosity while tensions remain high.

At the same time, more sophisticated Iranian-linked operators do not appear to be starting from scratch.

In my recent Cybernews reporting on Seedworm, the Iran-backed espionage group was found maintaining access to multiple organizations since early February – before the current escalation became front-page news – with targets spanning banking, aviation, technology, and nonprofit organizations.

The Easiest Way in Is Still Human Error

Cyberwar is no longer a niche story about espionage and classified systems, but has moved into the mainstream.

US cyber agencies warned last June (after the US bombed Iran’s nuclear facilities), that Iranian cyber actors often exploit familiar weaknesses – including unpatched software, known vulnerabilities, and default or commonly used passwords on internet-connected accounts and devices.

Those risks are also getting easier to scale. 

CrowdStrike’s latest threat reporting says AI is “scaling attacks and lowering barriers to entry,” turning it into both a force multiplier for cyberattacks and a new attack surface.

AI is allowing threat groups to move faster, generate more convincing phishing lures, and automate more of the attack chain than many defenders are prepared for.

We have seen this playbook before. Russia’s GRU-linked Sandworm hackers were blamed for disruptive attacks on Ukraine’s power grid, including a 2022 incident that researchers said coincided with missile strikes and triggered power cuts.

And after the October 7 attacks, US agencies warned that Iran-linked actors had targeted US water and wastewater facilities by exploiting Unitronics PLCs used in industrial control systems.

All because the PLCs were Israeli-made – once again, proving how quickly geopolitical cyber retaliation can move from symbolism to systems that touch everyday life.

For organizations, that means patching faster, locking down internet-facing devices, turning on MFA, and training employees on the latest phishing lures.

For everyone else, it is a reminder that human error is still one of the easiest ways in – and that the next disruption may hit not a government target, but the companies people depend on without thinking twice.

ABOUT THE AUTHOR

Stefanie Schappert, a senior journalist at Cybernews, is an accomplished writer with an M.S. in cybersecurity, immersed in the security world since 2019.  She has a decade-plus experience in America’s #1 news market working for Fox News, Gannett, Blaze Media, Verizon Fios1, and NY1 News.  With a strong focus on national security, data breaches, trending threats, hacker groups, global issues, and women in tech, she is also a commentator for live panels, podcasts, radio, and TV. Earned the ISC2 Certified in Cybersecurity (CC) certification as part of the initial CC pilot program, participated in numerous Capture-the-Flag (CTF) competitions, and took 3rd place in Temple University’s International Social Engineering Pen Testing Competition, sponsored by Google.  Member of Women’s Society of Cyberjutsu (WSC), Upsilon Pi Epsilon (UPE) International Honor Society for Computing and Information Disciplines.

Cybernews is a globally recognized independent media outlet where journalists and security experts debunk cyber by research, testing, and data. Founded in 2019 in response to rising concerns about online security, the site covers breaking news, conducts original investigations, and offers unique perspectives on the evolving digital security landscape. Through white-hat investigative techniques, Cybernews research team identifies and safely discloses cybersecurity threats and vulnerabilities, while the editorial team provides cybersecurity-related news, analysis, and opinions by industry insiders with complete independence. For more, visit www.cybernews.com.

Samsung’s New Offerings Are Now Available For Purchase

Posted in Commentary with tags on March 12, 2026 by itnerd

Following the recent unveiling at Unpacked, Samsung’s newest Galaxy devices are now officially available in stores and online across Canada

The new Samsung Galaxy S26 Series, including the Galaxy S26, S26+, and S26 Ultra, brings next-generation performance, AI-powered experiences, and enhanced camera capabilities to Samsung’s flagship lineup. Joining the launch is the Samsung Galaxy Buds4 Series and the new Samsung Galaxy Book6 Series, expanding the Galaxy ecosystem with upgraded audio and AI-powered productivity. 

For more information about the Galaxy S26 series and and the other products that are now available, please visit Samsung Canada.

Stryker Pwned By Iran Backed Hackers

Posted in Commentary with tags on March 12, 2026 by itnerd

US medical company, Stryker, has been pwned in a cyber attack by Iran-backed cybercriminals. Here’s some details on this attack:

Stryker is a Fortune 500 company that specializes in the manufacturing of surgical equipment, orthopedic implants, and neurotechnology. Headquartered in Michigan, the company employs approximately 56,000 people and reported over $25 billion in revenue for 2025. Its critical role in the healthcare supply chain makes it an essential partner for hospitals worldwide.

The Iran-linked hacker group named Handala has taken credit for the attack, claiming to have struck an “unprecedented blow” to the company.

The hackers claim to have wiped more than 200,000 servers, mobile devices, and other systems, forcing Stryker to shut down offices in 79 countries. They also allegedly stole 50TB of data from the company’s systems. 

Handala has been highly active since the start of the US-Israel-Iran conflict.

Lee Sult, Chief Investigator, Binalyze had this to say:

“The Stryker attack looks to be the first drop of blood in the water as a result of nation-state and hacktivist activity off the back of the Iran conflict. This attack confirms Western organizations are not only in the adversary’s crosshairs, but the adversary can also make the shot. More shots are coming.

“An attack like this is about damage and spreading chaos. Handala is using a scorched earth approach, they get in fast, wipe devices, steal data, and leave chaos behind them. Thousands of employees locked out of devices isn’t just an operational crisis. It quickly becomes a financial, reputational, and potentially life-and-property risk. 

“Speed is everything when attacks like this happen. Investigation can’t be an afterthought, organizations need to know if the attackers are still inside systems, which systems are impact, and how the attackers got in. The faster those questions are answered, the faster you can begin recovery.

“Stryker could be the first in a wave of attacks. Cyber assets friendly to the Iranian regime have regrouped and are actively circling their next target sets. Organizations need to be monitoring for IOCs linked to Iran-backed campaigns – including those seen in Operation Olalampo and APT35. But it’s also about reinforcing the basics: software needs to be patched, phishing-resistant MFA enabled, and having a clear plan to isolate devices and systems when suspicious activity arises. In firefighting terms, it’s time to cancel vacations and pre-stage your fire companies near critical assets.”

The age of hybrid warfare has clearly begun. That means that every single one of us needs to re-evaluate how secure we are and take the steps required to make sure that it is as hard as possible for a threat actor to pwn you. Given the state of the world at the moment, this isn’t optional anymore.

Cybercriminals now sell corporate network access for as little as $500

Posted in Commentary with tags on March 12, 2026 by itnerd

A new threat intelligence report from the Abstract’s Threat Research Organization (ASTRO) will reveal that the cybercrime economy has industrialized network breaches with specialized criminals now selling pre-compromised access to corporate networks for as little as $500.

Abstract’s report, “Priced to Move: The Underground Markets of Modern Cyberattacks,” examines the rapidly growing ecosystem of Initial Access Brokers (IABs): attackers who break into organizations and then sell that access to ransomware gangs and other threat actors.

Key findings from the research include:

  1. Credential abuse is now the dominant entry point. 56% of incidents involved valid accounts without MFA.
  2. Ransomware attacks surged 47% year over year, fueled by the growth of this underground access market.
  3. Network access often sells for $500–$1,000, allowing attackers to target dozens of organizations simultaneously.
  4. Median time from initial compromise to ransomware deployment has dropped to just five days.
  5. Healthcare, government, and education are among the sectors seeing the fastest growth in IAB-driven attacks.

The economics are striking. The report details a healthcare breach where $2,200 worth of purchased access ultimately resulted in nearly $4 million in damage, a roughly 1,700x return on investment for attackers.

ASTRO says the rise of access brokers has fundamentally changed how cybercrime operates…turning network intrusions into a specialized supply chain where one group gains access, another sells it, and ransomware gangs monetize it.

You can read the research here:https://abstract.security/reports/priced-to-move

SurePath AI Advances Real-Time Model Context Protocol (MCP) Policy Controls to Govern AI Actions

Posted in Commentary on March 12, 2026 by itnerd

SurePath AI today announced MCP Policy Controls, which provides real-time controls over what MCP servers and tools are allowed to be used. The new capability helps organizations adopt MCP safely with visibility and safeguards from day one.

MCP is a direct line from generative AI clients to the systems that enable a business to operate. These lightweight MCP tools can run locally on a user’s laptop and are often launched silently by AI desktop apps like ChatGPT, Claude, and Cursor. They also link to internal tools, such as Google Drive, Salesforce, and AWS management APIs. This presents new security challenges – AI is now issuing real commands, authenticated as the end user.  While cloud-based MCPs offer some guardrails, they also increase surface area. For instance, multiple agents connected to a mix of local and remote MCP servers can create tangled pathways for data sprawl and lateral movement.

SurePath AI was purpose-built to solve these challenges by applying policy-based control over what MCP servers and tools are allowed to be used before anything is executed. As the only platform that is schema-aware enough to transform these requests, SurePath AI enforces an organization’s policies on exactly which MCP servers and tools are allowed by controlling local MCP hosts and their connections to local MCP servers. These policies can leverage built-in classifications of whether a tool is destructive or not, or be customized explicitly to each organization’s security requirements.

To mitigate risk on the remote side, SurePath AI maintains a catalog of known MCP servers and endpoints. All protected MCP traffic is routed through its platform, where access controls are applied in real time, even down to the specific tool. SurePath AI’s new capability also uncovers supply chain threats by detecting never-before-seen MCP tools that could impersonate other tools or attempt to exfiltrate data outside the approved security perimeter.

Key features include:

  • MCP Tool Discovery: Discover MCP tools through monitoring MCP usage in AI tools across the workforce by intercepting MCP payloads and removing tools that are either blocked by policy or in violation of capability requirements, such as tools that are not read-only. When a tool violates policy, it is removed from the MCP payload before being sent to the backend service, which means that the service will not have access to leverage that tool.
  • MCP Tool Block List: Explicitly block specific MCP tools that have been discovered in the environment. Blocked tools are removed from MCP payloads before they reach backend services.
  • MCP Tool Allow List: Allow specific MCP tools that have been discovered in the environment. Allowed tools will always be included in MCP payloads.
  • Allow Read-Only: When enabled, automatically enables all read-only MCP tools without requiring them to be added to the Allow List, streamlining policy management for lower-risk tools.
  • Catch-All Action: Determine the default action taken for MCP tools that are not explicitly allowed or blocked, providing control over how the system handles tools that fall outside of the defined block and allow lists.
  • Auto-Discovery and Classification: Gain insights into MCP tools, like whether they are well-known or just built on someone’s laptop

For more information, visit surepath.ai.

CISA issues urgent directive on Cisco SD-WAN vulnerabilities that are being actively exploited 

Posted in Commentary with tags on March 11, 2026 by itnerd

There is a new urgent directive from the CISA released this morning which is Emergency Directive 26-03, warning that threat actors are actively exploiting vulnerabilities in Cisco Catalyst SD-WAN systems used across federal networks. The directive requires agencies to immediately inventory affected systems, collect forensic artifacts, apply patches, and hunt for signs of compromise. 

The vulnerabilities include CVE-2026-20127, a critical authentication bypass flaw (CVSS 10) that could allow an unauthenticated attacker to gain administrative access to SD-WAN infrastructure and potentially manipulate network configurations. 

Bobby Kuzma, Director of Offensive Operations at ProCircular had this to say:

“CISA has clear reason to believe that these vulnerabilities have been, and likely continue to be, exploited by threat actors to compromise government systems and networks. The requests for artifact collection and submission make it clear they’re working to identify the scope of the threat. While contractors and civilian organizations are not required or requested to follow similar collection steps, if you have Cisco SD-WAN appliances in your environment, this is a good time to collect artifacts and review patch statuses and logs.”

Once again it’s time to patch all the things. Though this time around, this patching exercise is pretty urgent and should be done without delay.

Equinix Unveils Distributed AI Infrastructure

Posted in Commentary with tags on March 11, 2026 by itnerd

At its inaugural AI Summit, Equinix, Inc. unveiled its Distributed AI infrastructure—a bold new approach to power the next wave of AI innovation, including agentic AI. Today’s announcement includes a new AI-ready backbone to support distributed AI deployments, a global AI Solutions Lab to test new solutions, and Fabric Intelligence to better support next-generation workloads for enterprises.

Fabric Intelligence AI-Driven Network Automation

As businesses look to deploy next-generation AI tools, such as AI agents, enterprises need to rethink their existing IT architecture. Equinix’s Distributed AI has been engineered from the ground up to support the scale, speed and complexity of modern intelligent systems—including the evolution from static models to autonomous, agentic AI capable of reasoning, acting and learning independently. Unlike traditional applications, AI is inherently distributed, with distinct infrastructure requirements for training, inferencing and data sovereignty. Meeting these needs requires a new kind of infrastructure—globally distributed, deeply interconnected and built for performance at scale. With a fully programmable, AI-optimized network linking 270+ data centers across 77 markets, Equinix is uniquely positioned to unify these environments across geographies, enabling intelligent systems to operate reliably, securely and everywhere they need to be.

Key announcements from Equinix’s inaugural AI Summit include:

Fabric Intelligence:

  • A software layer that enhances Equinix Fabric®, an on-demand global interconnection service, with real-time awareness and automation for AI and multicloud workloads.
  • Available in Q1 2026, Fabric Intelligence integrates with AI orchestration tools to automate connectivity decisions, taps into live telemetry for deep observability, and dynamically adjusts routing and segmentation to optimize performance and simplify network operations. By making the network responsive to workload demands, Fabric Intelligence helps enterprises reduce manual effort, accelerate deployment and keep pace with the scale and speed of AI.

AI Solutions Lab at Equinix Solution Validation Center® facilities: 

  • Equinix is launching a global AI Solutions Lab across 20 locations in 10 countries, giving enterprises a dynamic environment to collaborate with leading AI partners.
  • Available today, enterprises can use the AI Solutions Lab to connect to the expansive Equinix AI partner ecosystem. This collaboration can help to de-risk AI adoption, co-innovate solutions, and to move faster from idea to operational AI deployment.

Expansion of Equinix’s AI ecosystem:

  • Now one of the most comprehensive vendor-neutral AI ecosystems in the industry, with more than 2,000 partners worldwide, making next-generation AI inferencing services discoverable and actionable through the new Fabric Intelligence.
  • Providing enterprises access to cutting-edge technology, including the GroqCloud™ platform in Q1 2026, to enable direct, private access to leading-edge inference platforms without custom builds—so they can connect and scale AI services faster with enterprise-grade performance and security.

With Equinix’s Distributed AI infrastructure, enterprises will be able to support use cases like real-time decision-making for predictive maintenance in manufacturing, dynamic retail optimization and faster fraud detection in financial services. By enabling AI at the edge and across regions, Equinix helps organizations run scalable, compliant and low-latency AI workloads wherever they’re needed. These products are expected to become available in the first quarter of 2026.