![]() |
Scinary Information NexusCybersecurity discussions, news, and expert interviews Author: Scinary Cybersecurity
Scinary Cybersecurity is here to "Serve and defend those who serve and defend others". To help us "serve and defend" we pull from many different sources - experts, colleagues, industry standards, etc... We hit every subject from all angles making it easy to understand while also letting us go in depth. Making this podcast perfect for cybersecurity beginners and experts alike. Come join us on our journey to constantly educate ourselves and explore the amazing things that are happening in our industry. Language: en-us Genres: News, Tech News, Technology Contact email: Get it Feed URL: Get it iTunes ID: Get it |
Listen Now...
Episode 39: Weaponizing Trust: The Threat of Compromised MDMs
Friday, 20 March, 2026
Welcome back to the Scinary Information Nexus! After a category 4 hangover (and some failed attempts to lock him out), Richard is back in the studio with the team to discuss a massive development in critical infrastructure security. This week, we are breaking down the devastating cyberattack on Stryker, a major medical device manufacturer. After an Iranian-backed hacktivist group triggered a catastrophic breach, 70 global offices were shut down and 20,000 machines were wiped. We discuss why Stryker was targeted, the brutal reality of employees having their personal cell phones completely wiped via the company's MDM, and the terrifying differences between financial ransomware gangs and nation-state actors bent purely on destruction. Plus, Mario and the team dive into live stock market tracking to uncover a highly suspicious multi-million dollar stock dump by insiders just weeks before the attack. Was it a coincidence, or the ultimate insider threat? In this episode, we discuss: The Stryker Breach: How Iranian hacktivists took down 20,000 machines globally. BYOD Nightmare: Why connecting your personal phone to company portals can result in total data loss. Cyber Warfare Motives: Sabotage and defacement vs. financial extortion. The "Radicalization Pipeline": How terrorist groups grow (explained via Taylor Swift and Sex and the City fans). Live Conspiracy Theory: Tracking massive insider stock sell-offs right before the breach. A quick teaser for next week's highly anticipated Google discussion. If a nation-state decides your company is their next target, do you stand a chance? Let's discuss. Connect with Scinary Cybersecurity: https://www.scinary.com https://x.com/scinarycyber https://www.linkedin.com/company/scinarycyber/ Cybersecurity #Stryker #Hacktivism #DataBreach #InfoSec









