The TriMed Data Breach & Why Healthcare EHR Platforms Are Now Prime Cyberattack Targets
TriMed Inc.'s EHR platform breach exposes hundreds of medical practices — and it's part of a deliberate pattern of attacks on healthcare. Sara Voss explains what happened, why healthcare is the new cyber battlefield, and what to do now.
Read More
Iran's Cyber War Goes Mainstream: Bomb-Shelter Spyware, Stryker Wiped, and 5,800 Attacks
Since the Iran War began February 28, 2026, nearly 50 Iran-linked hacker groups have launched 5,800 tracked attacks — including bomb-shelter spyware synced to the second of missile strikes, real-time device wipes at Stryker, a claimed 375TB Lockheed breach, and the hacking of FBI Director Kash Patel. Sara Voss breaks down the most sophisticated cyber-physical war campaign in history.
Read More
The Car Breathalyzer Hack: When Cybercrime Stops You From Driving to Work
On March 27, 2026, a cyberattack on a breathalyzer interlock vendor left court-ordered drivers unable to start their vehicles — not because they were drinking, but because a hacker flipped a switch. This is what IoT insecurity looks like in the real world.
Read More
Aura Got Breached: 900,000 Records Stolen From an Identity Protection Company — The Ultimate Irony
Aura, which sells identity theft protection, had 900,000 customer records stolen in a breach. Here's the security irony, what was taken, and what to do now.
Read More
TELUS Digital, 700TB Gone: ShinyHunters Are Back — and the EU Just Sanctioned Their Sponsors
ShinyHunters stole 700TB from TELUS Digital — the largest telecom breach of 2026. The EU responded with cyber sanctions. Here's everything you need to know.
Read More
Pro-Iran Hackers Hit Stryker: When Medical Supply Chain Becomes a Cyberweapon
Pro-Iran hackers attacked Stryker's medical supply chain, delaying surgeries in 12 hospitals. Here's how healthcare became the next cyberwar battlefield.
Read More
When AI Becomes the Hacker: How Claude Was Jailbroken to Steal 195 Million Mexican Tax Records
Researchers jailbroke Claude and used it to autonomously steal credentials and exfiltrate 195M records. Here's how AI is becoming the preferred hacker tool.
Read More
The State-Sponsored Hacking Playbook of 2026: Volt, Flax, and Now "Lotus Blossom"
Volt Typhoon, Flax Typhoon, and Lotus Blossom have new playbooks for 2026. Here's a deep look at how state-sponsored hackers are operating this year.
Read More
The Ledger Breach, the Nike Hack, and Why 2026 Is Already a Disaster for Data Security
The Ledger hardware wallet breach and Nike's supply chain hack set the tone for 2026 as the worst year in cybercrime history. Full analysis here.
Read More