Source: the perpetrators of a wiper attack on Stryker appear to have used Microsoft Intune to issue a "remote wipe" command against all connected devices (Brian Krebs/Krebs on Security)

Brian Krebs / Krebs on Security: Source: the perpetrators of a wiper attack on Stryker appear to have used Microsoft Intune to issue a “remote wipe” command against all connected devices  —  A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker …

Source: the perpetrators of a wiper attack on Stryker appear to have used Microsoft Intune to issue a "remote wipe" command against all connected devices (Brian Krebs/Krebs on Security)
Brian Krebs / Krebs on Security: Source: the perpetrators of a wiper attack on Stryker appear to have used Microsoft Intune to issue a “remote wipe” command against all connected devices  —  A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker …