CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Mar 19, 2026

Secure endpoint management systems immediately, CISA urges

Help Net Security Archived Mar 19, 2026 ✓ Full text saved

The US Cybersecurity and Infrastructure Security Agency (CISA) warns that the cyberattack on Stryker Corporation serves as a signal to U.S. organizations that foreign cyber activity tied to Middle East conflicts may be spilling into their operations. Attackers breached Stryker’s internal Microsoft environment and reportedly wiped 200,000 systems, servers, and mobile devices, while extracting 50 terabytes of data. To defend against similar malicious activity involving the misuse of legitimate end

Full text archived locally
✦ AI Summary · Claude Sonnet


    Sinisa Markovic, Senior Staff Writer, Help Net Security March 19, 2026 Share Secure endpoint management systems immediately, CISA urges The US Cybersecurity and Infrastructure Security Agency (CISA) warns that the cyberattack on Stryker Corporation serves as a signal to U.S. organizations that foreign cyber activity tied to Middle East conflicts may be spilling into their operations. Attackers breached Stryker’s internal Microsoft environment and reportedly wiped 200,000 systems, servers, and mobile devices, while extracting 50 terabytes of data. To defend against similar malicious activity involving the misuse of legitimate endpoint management software, CISA urges organizations to implement Microsoft’s best practices for securing Microsoft Intune and apply the same principles to other endpoint management platforms. The agency recommends using least privilege when designing administrative roles, limiting access through role-based controls, and enforcing phishing-resistant MFA. It also advises using Microsoft Entra ID capabilities to block unauthorized access to privileged actions in Microsoft Intune. “Set up policies that require a second administrative account’s approval to allow changes to sensitive or high-impact actions (such as device wiping), applications, scripts, RBAC, configurations, etc,” CISA added. CISA said it is collaborating with federal partners, including the FBI, to identify potential threats and determine mitigation actions. More about CISA cybersecurity endpoint management endpoint security government Microsoft USA Share
    💬 Team Notes
    Article Info
    Source
    Help Net Security
    Category
    ◇ Industry News & Leadership
    Published
    Mar 19, 2026
    Archived
    Mar 19, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗