
Hello all,
Last week I’d noted that I was surprised that there had been no evident cyber-retaliatory attacks by Iranian threat actors. Welp, on Wednesday a threat group named Handala claimed a successful attack on Stryker, a USA based global medical equipment company with $25.1 billion in revenue in 2025. According to the threat group, Stryker had a substantial portion of their systems apparently remote-wiped and 50TB of data exfiltrated. Also in the news this week, there was an enormous quantity of software defects and updates unleashed by the likes of Adobe, Apple, ASUS, Cisco, Google, HPE, Microsoft, SAP, and Veeam. Defenders will be busy.
Headline NEWS:
- Iran War tech casualties. Stryker Corporation, a global medical device manufacturer with an estimated 56,000 employees, was forced to send most of them home on Wednesday when they discovered that they’d been attacked by Handala Hack Team. The threat group claims to have exfiltrated 50TB of data and then remote wiping over 200,000 devices via Microsoft Intune. This successful destruction should cause chills to run up the spine of every system administrator and security professional. There was no malware involved, legitimate tooling was broken into and used against Stryker in a devastating way. Identity truly is the new battlefront. Microsoft, apparently in response, has published, Best practices for securing Microsoft Intune. It is well worth reading and implementing the guidance therein. Verifone, a global payment and verification company was also claimed to have been hacked by Handala, but Verifone is denying the claim and asserts that there is no evidence of compromise. Handala has revealed what appears to be screen shots of administrative interfaces of Verifone systems. I guess we’ll see soon if this is legitimate.
- Cisco disclosed yet another defect that needs immediate patching, this is the third week in a row they’ve announced patches. The most recent announced defect is in Cisco’s IOS XR and can allow elevation to root. Additionally, Cisco released updates for Packaged CCE, Unified CCE, Unified CCX, and Unified Intelligence Center.
- Google patched several Chrome zero-days. Update your browser immediately. You should get in the habit of restarting your chromium-based browsers at least weekly, since Google has announced that Chrome will now have an accelerated update cycle with updates coming much more frequently.
- HPE has released updates to their Aruba Networking AOS-CX operating system to address a critical defect that enables administrator account password reset. There is some mitigation guidance provided by HPE in case you cannot immediately update your switches. There is no currently known active exploitation. So patch soon.
- Microsoft Patch Tuesday March 2026 was typical in size with 79 or 83 defects being patched, depending on who is counting. There were two zero-day remote code execution (RCE) vulnerabilities addressed in Microsoft Office. It would be wise to prioritize those since apparently; they can be triggered via the application’s preview pane. As with any Microsoft patch, vet them first on a subset of systems. There are usually issues reported, some of which are already cropping up and are linked in our full report.
- Nginx UI Flaw enables a threat actor to access the server’s backup without authentication. This requires immediate attention if you publicly expose Nginx as this could result in exfiltration of critical information about the system’s configuration, credentials, tokens, and keys. Proof of Concept (PoC) is already in the wild, so now it is a race to patch or purloin. Don’t wait on this one.
- Veeam Backup and Replication released patches to address defects that can allow remote code execution if successfully exploited. It should be noted that most of the flaws involve a domain authenticated user. Best practice is that your Veeam backup server is not domain joined and uses separate credentials. Threat actors are quick to jump on these defects since if they can wipe your backups, you would be forced to pay their ransoms should they successfully encrypt your systems. A few of the patches are not related to domain join, so please patch quickly.
In Ransomware, Malware, and Vulnerabilities News:
- ClickFix Attacks Evolving. In the latest twist on what has been an amazingly successful infiltration method by dirtbags, the newest variants have users executing shortcut keys to bring up Windows Terminal (instead of Windows Run), and then have the user paste PowerShell commands into that. In another variant named InstallFix, these evil soulless meat-bags clone legitimate sites that offer helpful instructions for n00bs (people new to the industry or who are learning), and then along with the legitimate commands that instruct the novice how to accomplish a task by copying and pasting into their command-line and terminal sessions. Threat actors count on the novice not recognizing suspicious commands, and have the n00b paste commands that inject malicious downloaders that then infect the unsuspecting person’s system with keyloggers, Info Stealers, Remote Access Trojans (RAT), and more. The internet is not a safe place.
In Other News Events of Note and Interest:
- Start-up is building the first data center to use human brain cells. I could leave this headline right there. But I won’t. Are they crazy!? This has all the makings of a b-rated sci-fi movie. It is bad enough that we are racing toward some sort of world-dominating AI consciousness with the speed of a three-year-old grabbing a cookie off the counter, but now we’re actively working on making data centers that could potentially develop their own neural pathways? Yikes! The prior article explains how human brain cells on a chip have learned to play the first-person shooter game Doom. Consider me a Luddite, but I don’t like this one bit.
Musings
Stryker Corporation is dealing with what is pretty much a worst-case scenario. I wonder if any of their enterprise planning were prepared for this outcome? If your company and systems are still working well, thank your cyber defenders for doing their jobs. And then ask for a review of your Disaster Recovery Plans, who does what, when, and how, if a disaster arises. How about your Business Continuity Plan? Do you have one? How will your business continue to make money, to do what it is that your business does if your systems are down? And what about your Business Resumption Plan? You have one, right? How do you effectively and safely bring things back online after being down? Who needs to be contacted, in what order, what information is needed, etc.? News headlines such as Stryker should serve as a metaphorical wake-up call to all of us. We cannot rest, we must be ever vigilant, and we must keep our DR, BC, and BR plans current, relevant, and available.

Keep the shields up!
Viscount Jan Broucinek
Red Dot Security News
Headline NEWS
- Iran war: Handala tied to cyberattack on US company Stryker
- Stryker experiencing widespread outage due to cyberattack
- Iran-linked hackers hit US company Stryker, experts say attack not surprising amid escalating tensions
- Iran-Linked Handala Hackers Claim Major Hacks on Stryker and Verifone
- Cisco Patches High-Severity IOS XR Vulnerabilities
- Google fixes two new Chrome zero-days exploited in attacks
- HPE warns of critical AOS-CX flaw allowing admin password resets
- Microsoft March 2026 Patch Tuesday fixes 2 zero-days, 79 flaws
- Patch Tuesday March 2026
- Critical Microsoft Excel bug weaponizes Copilot Agent
- Critical Nginx UI flaw CVE-2026-27944 exposes server backups
- Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices
- Veeam Patches 7 Critical Backup & Replication Flaws Allowing Remote Code Execution
Ransomware, Malware, and Vulnerabilities News
- Good News, Government News, and Interesting
- Iran is the first out-loud cyberwar the US has fought
- Destroying Systems and Data: How Iranian Hackers Plan to Retaliate Against Israel, Cyber Agency Warns
- Anthropic sues Defense Department over supply-chain risk designation
- Anthropic Sues Department of Defense Over ‘Supply Chain Risk’ Label
- Microsoft backs AI firm Anthropic in legal battle against Pentagon
- Lululemon fined more than $700,000 for spam email breaches
- US charges another ransomware negotiator linked to BlackCat attacks
- Meta disables 150,000 accounts in cyber scam crackdown
- INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrime
- Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries
- White House Cyber Strategy Prioritizes Offense
- Cambodia says it will shut down online scam centers by the end of April
- Proactive Preparation and Hardening Against Destructive Attacks: 2026 Edition
- Vulnerabilities and Exploits
- CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited
- CISA orders feds to patch n8n RCE flaw exploited in attacks
- Google paid $17.1 million for vulnerability reports in 2025
- Critical defect in Java security engine poses serious downstream security risks
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials
- New KadNap botnet hijacks ASUS routers to fuel cybercrime proxy network
- Check Your Asus Router for Malware ASAP
- Critical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials
- Web Server Exploits and Mimikatz Used in Attacks Targeting Asian Critical Infrastructure
- Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft
- iPhone calendar scam: How to stop fake alerts
- An iPhone-hacking toolkit used by Russian spies likely came from U.S military contractor
- Russia-backed hackers breach Signal, WhatsApp accounts of officials, journalists, Netherlands warns
- China-Linked Hackers Hit Qatar with Backdoor Disguised as War News
- China’s CERT warns OpenClaw can inflict nasty wounds
- Scams could now cost Americans $119 billion a year, study finds
- SQLi flaw in Elementor Ally plugin impacts 250k+ WordPress sites
- New PhantomRaven NPM attack wave steals dev data via 88 packages
- Apple confirms today’s iOS and iPadOS updates fix Coruna exploit
- Your forgotten email accounts are more dangerous than you think
- Fake enterprise VPN sites used to steal company credentials
- Phishing, Malware, and similar
- Ericsson breach blamed on third party vendor vishing attack
- Employees thought they were fixing a browser error until fake IT support quietly walked them through infecting their own company computers
- Microsoft Teams phishing targets employees with A0Backdoor malware
- FBI warns of phishing attacks impersonating US city, county officials
- FBI alert: scammers target zoning permit applicants
- Hackers abuse .arpa DNS and ipv6 to evade phishing defenses
- When Auto-Updates Become Attack Paths
- Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials
- Captcha scam spreads online, tricking Mac users with malware
- Investigating a New Click-Fix Variant
- ‘InstallFix’ Attacks Spread Fake Claude Code Sites
- InstallFix: Weaponizing malvertized install guides
- Microsoft warns ClickFix attacks targeting Windows Terminal to trick users into running malware
- Uncovering a New Device Code Phishing Campaign
- Fake job applications pack malware that disables EDR
- New BeatBanker Android malware poses as Starlink app to hijack devices
- New ‘Zombie ZIP’ technique lets malware slip past security tools
- Russian crims phish way into Signal and WhatsApp accounts
- Contagious Interview: Malware delivered through fake developer job interviews
- The FBI is investigating malware hidden inside games hosted on Steam
- Polyfill Supply Chain Attack Impacting 100k Sites Linked to North Korea
- Breaches, Leaks, and Ransomware
- More companies are paying ransoms after cyberattacks
- Cyberattackers encrypt Community College of Beaver County’s data and demand ransom payments
- APT28 hackers deploy customized variant of Covenant open-source tool
- Salt Typhoon is hacking the world’s phone and internet giants. Here’s everywhere that’s been hit
- Transport for London says 2024 breach affected 7M customers
- IDMerit exposes 1 billion identity records in unprotected database
- Crims hit EV charger firm ELECQ, steal customer contact data
- Ericsson US discloses data breach after service provider hack
- 235,000 affected by cyberattack on largest ambulance provider in Wisconsin
- ShinyHunters claims yet another Salesforce customers breach
- Michelin Confirms Data Breach Linked to Oracle EBS Attack
- Telus Digital confirms breach after hacker claims 1 petabyte data theft
- Intuitive Surgical stock falls on cyber breach
- Trizetto Notifying 3.4M of 2024 Hack Detected in 2025
- North Korean hackers stole millions of dollars in cryptocurrencies. Their work was impeccable
- Ericsson US discloses data breach after service provider hack
- From a Sophisticated Browser-Extension Supply-Chain Compromise to a VibeCoded Twist: A Chrome Extension as the Initial Access Vector for a Broader Malware Chain
- Starbucks discloses data breach affecting hundreds of employees
- AI-generated Slopoly malware used in Interlock ransomware attack
- INC Ransomware Group Holds Healthcare Hostage in Oceania
- England Hockey investigating ransomware data breach
Other News Events of Note and Interest
- Cool Tool: GIMP 3.2 Released With Many Improvements
- Celebrating 20 years of Amazon S3
- Xen Project announces five years of support for all releases
- Google rolls out new Gemini capabilities to Docs, Sheets, Slides, and Drive
- Google Maps gets its biggest navigation redesign in a decade, plus more AI
- Ask Maps and Immersive Navigation: New AI features in Google Maps
- Google Maps Unveils Immersive Navigation
- Memory scalpers hunt scarce DRAM with bot blitz
- Human brain cells on a chip learn to play Doom
- Start-up is building the first data centre to use human brain cells
- Product ethics have never mattered more | by Dora Czerna
- HP has new incentive to stop blocking third-party ink in its printers
- Canva can now turn a flat AI image into a fully editable design in seconds
- Russia’s crackdown on VPNs reaches new heights as internet restrictions intensify
- AI, LLM’s, and Skynet
- Anthropic launches code review tool to check flood of AI-generated code
- Copilot in Outlook: New agentic experiences for email and calendar
- From draft to done: agentic Copilot in Excel, Word, and PowerPoint
- Microsoft 365 Copilot Wave 3 announced: New agentic features for Word, Excel, and Outlook
- Write better with an AI letter generator
- Anthropic and OpenAI just exposed SAST’s structural blind spot with free tools
- Introducing The Anthropic Institute
- AI Agent Goes Rogue, Starts Mining Crypto to Amass Funds
- Meta acquires Moltbook, the AI agent social network
- Enterprise identity was built for humans — not AI agents
- Google finds that AI agents learn to cooperate when trained against unpredictable opponents
- Undercover Cop Generated An AI Teenager To Catch Pedophiles
- Microsoft
- Windows 11 KB5079473 released with features, direct download links for offline installers
- Microsoft updates official Windows 11 ISO tool with the latest system updates
- Microsoft releases Windows 10 KB5078885 extended security update
- Microsoft adds higher-priced Office tier with Copilot AI
- Partner Blog | Introducing Microsoft 365 E7: The Frontier Suite
- Copilot Cowork: A new way of getting work done
- Outlook for Windows is getting a new feature that will make it more resilient to net outages
- Microsoft investigates classic Outlook sync and connection issues
- Microsoft to enable Windows hotpatch security updates by default
- Microsoft tightens Authenticator checks on Android and iOS
- Microsoft brings phishing-resistant Windows sign-ins via Entra passkeys
- Microsoft still working to fix Windows Explorer white flashes
- Office apps are getting a new, easy way to share documents
- Microsoft finally fixes the most obvious flaw in Word, Excel, and PowerPoint Online
- From transparency to action: What the latest Microsoft email security benchmark reveals
- Microsoft to Make New ‘Xbox Mode’ Available on All Windows 11 PCs Next Month
- KB5084597: Microsoft outs Windows 11 25H2, 24H2 emergency update for a critical network flaw
- Windows 11 will let you name your user folder during setup
- Report: Windows 11 KB5079473 fails to install, reboot loops, freezes system, breaks graphics
- Best practices for securing Microsoft Intune
