AstraZeneca Allegedly Targeted by LAPSUS$ — Claims of a 3GB Internal Data Dump

AstraZeneca Allegedly Targeted by LAPSUS$ — Claims of a 3GB Internal Data Dump

A known hacking collective identifying as LAPSUS$ has posted claims that it obtained and is attempting to sell a 3GB .tar.gz archive allegedly containing AstraZeneca internal data. As of the reports dated March 20, 2026, AstraZeneca had not issued a public statement confirming or denying the claim. What the threat actors presented The actors published teasers and screenshots on breach

What the Marquis Breach Teaches Us About Vendor Risk and Ransomware Preparedness

What the Marquis Breach Teaches Us About Vendor Risk and Ransomware Preparedness

Marquis, a Texas-based provider of digital marketing, CRM and analytics services for hundreds of financial institutions, disclosed a major security incident tied to a mid‑2025 ransomware attack that ultimately exposed the personal information of more than 672,000 people. The story is less about a single failure and more about how a cascade of weaknesses—an exploited firewall, third‑party exposure, and slow

Aura Exposed: When 900,000 Marketing Contacts Turned Into a Security Crisis

Aura Exposed: When 900,000 Marketing Contacts Turned Into a Security Crisis

Aura, the consumer digital safety company known for identity protection and fraud monitoring, recently confirmed a data breach that exposed nearly 900,000 marketing contacts. What seems like a single shocking number actually reveals deeper problems: legacy data inherited through acquisitions, the continued effectiveness of social-engineering attacks, and the tricky line between marketing lists and active customer records. This incident is

Stryker Confirms Massive Wiper Strike — Thousands of Devices Erased in Alleged Iran-Linked Operation

Stryker Confirms Massive Wiper Strike — Thousands of Devices Erased in Alleged Iran-Linked Operation

Stryker, the global medical technology company, confirmed on March 11, 2026, that it suffered a significant, destructive cyberattack that disabled large parts of its corporate Microsoft environment and resulted in the wiping of thousands of devices. The company characterized the incident as a deliberate data-destruction operation rather than a ransomware extortion scheme, and investigators and security firms have pointed to

Cognizant’s TriZetto Subsidiary Reports Data Breach Affecting 3.4 Million Patients

Cognizant’s TriZetto Subsidiary Reports Data Breach Affecting 3.4 Million Patients

TriZetto Provider Solutions, a healthcare-technology subsidiary of Cognizant, has disclosed a large data breach that exposed the protected health information of 3,433,965 patients. The company classified the incident as an external system hacking event after threat actors gained unauthorized access to TriZetto’s external infrastructure. Timeline and discovery Initial unauthorized access occurred on November 19, 2024. TriZetto did not detect the

VoidLink Malware Framework: Key Points on How It Targets Kubernetes and AI Workloads

VoidLink Malware Framework: Key Points on How It Targets Kubernetes and AI Workloads

Title: VoidLink Malware Framework: Key Points on How It Targets Kubernetes and AI Workloads Overview VoidLink is a modular malware framework observed targeting cloud-native environments, with emphasis on Kubernetes clusters and AI infrastructure. Goal: persistence, lateral movement, data exfiltration, and abuse of compute (e.g., model theft, crypto-mining, or training/serving misuse). Modularity enables plugins for container escape, kubeconfig harvesting, and targeted