Cleartext – March 04, 2026
Wednesday, March 4, 2026·6:11
Enjoy the show? Subscribe to never miss an episode.
Show Notes
Cleartext – March 04, 2026
Daily cybersecurity briefing for CISOs and security leaders.
Episode Summary
Today's episode covers 9 stories across 6 topic areas, including: Risky Bulletin: Cyber Command conducted cyberattacks ahead of Iran strikes; Pro-Russia actors team with Iran-linked hackers in attacks; Possible U.S.-developed exploits linked to first known ‘mass’ iOS attack.
Stories Covered
🌍 Geopolitical
Risky Bulletin: Cyber Command conducted cyberattacks ahead of Iran strikes
Risky Business News · Mar 03 · Relevance: █████████░ 9/10
Why it matters to CISOs: Active US cyber operations against Iran signal heightened state-level cyber conflict; CISOs in critical infrastructure and defense supply chains should elevate threat monitoring for retaliatory activity from Iranian and allied threat actors.
- US Cyber Command conducted offensive cyber operations ahead of kinetic strikes on Iran
- Pro-Russia actors are teaming with Iran-linked hackers targeting US and Middle East critical infrastructure
- Cyber operations included disruption of communications and surveillance support
Pro-Russia actors team with Iran-linked hackers in attacks
Cybersecurity Dive · Mar 03 · Relevance: ████████░░ 8/10
Why it matters to CISOs: The convergence of Russian and Iranian threat actors targeting US and Middle East critical infrastructure represents a new cooperative threat model that broadens the adversary capability set CISOs must defend against.
- Pro-Russia and Iran-linked groups formed a loose alliance
- Targeting critical infrastructure in the Middle East and the US
- Alliance formed in the context of the ongoing Iran conflict
Possible U.S.-developed exploits linked to first known ‘mass’ iOS attack
CyberScoop · Mar 03 · Relevance: ████████░░ 8/10
Why it matters to CISOs: The proliferation of a government-grade iOS exploit kit to Russian and Chinese cybercriminals represents a paradigm shift in mobile threat exposure — CISOs must reassess mobile device security postures and MDM enforcement.
- Coruna exploit kit uses 23 exploits across five chains targeting iOS 13–17.2.1
- Kit traced from a spyware vendor's customer to Russian hackers to Chinese cybercriminals
- Possibly tens of thousands of devices infected; kit likely originally built for US government
Sprawling FBI, European operation takes down Leakbase cybercriminal forum
The Record (Recorded Future) · Mar 04 · Relevance: ███████░░░ 7/10
Why it matters to CISOs: The takedown of Leakbase disrupts a major marketplace for stolen credentials and exploits; CISOs should check whether their organizations' data appeared on the forum and assess credential exposure.
- FBI and European law enforcement conducted a global crackdown
- Leakbase was a forum for buying and selling stolen credentials and exploit code
- Operation was multinational in scope
📡 Macro Trends
Zurich Acquires Beazley in $11 Billion Deal to Lead Cyberinsurance
SecurityWeek · Mar 04 · Relevance: █████████░ 9/10
Why it matters to CISOs: This mega-deal reshapes the cyber insurance landscape; CISOs should anticipate changes in policy terms, underwriting standards, and coverage availability as the combined entity consolidates market power.
- Zurich acquiring Beazley for $11 billion
- Deal expected to close in second half of 2026 pending approvals
- Creates a dominant player in the cyber insurance market
🔓 Data Breach
LexisNexis says hackers accessed legacy data in contained breach
The Record (Recorded Future) · Mar 03 · Relevance: ████████░░ 8/10
Why it matters to CISOs: LexisNexis holds massive troves of legal, financial, and personal data used across enterprises; this breach underscores the risk of legacy data stores and the downstream impact on organizations relying on this data.
- Threat actor claimed to steal 2 GB of data including millions of records
- Hackers accessed legacy data systems
- LexisNexis confirmed the breach and described it as contained
⚖️ Governance & Policy
Pentagon vendor cutoff exposes the AI dependency map most enterprises never built
VentureBeat Security · Mar 04 · Relevance: █████████░ 9/10
Why it matters to CISOs: The federal ban on Anthropic technology reveals that most enterprises lack visibility into where AI models are embedded across their supply chains — a critical governance gap CISOs must address before similar mandates or incidents affect them.
- US government agencies ordered to cease using Anthropic technology with a six-month phaseout
- Only 15% of CISOs surveyed said they have mapped AI vendor dependencies
- AI dependencies cascade through vendors and SaaS platforms adopted without procurement review
🚀 Startup Ecosystem
Startup JetStream Secures $34M Seed Round for AI Governance
BankInfoSecurity · Mar 04 · Relevance: ███████░░░ 7/10
Why it matters to CISOs: A $34M seed round for AI governance tooling signals strong investor conviction that CISOs need dedicated platforms to manage shadow AI, MCP servers, and token-level cost controls — a rapidly growing budget category.
- $34 million seed round led by ex-CrowdStrike product leader
- Targets shadow AI, MCP server governance, and token-level spending controls
- Provides visibility and guardrails across cloud and SaaS AI environments
🚨 Critical Vulnerability
CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog
The Hacker News · Mar 04 · Relevance: ████████░░ 8/10
Why it matters to CISOs: VMware Aria Operations is widely deployed in enterprise environments for infrastructure monitoring; an unauthenticated RCE flaw being actively exploited demands immediate patching priority.
- CVE-2026-22719 is a command injection flaw with CVSS 8.1
- CISA added it to KEV catalog citing active exploitation
- Unauthenticated attackers can achieve remote code execution
Further Reading
- 🌍 Risky Bulletin: Cyber Command conducted cyberattacks ahead of Iran strikes — Risky Business News
- 🌍 Pro-Russia actors team with Iran-linked hackers in attacks — Cybersecurity Dive
- 🌍 Possible U.S.-developed exploits linked to first known ‘mass’ iOS attack — CyberScoop
- 🌍 Sprawling FBI, European operation takes down Leakbase cybercriminal forum — The Record (Recorded Future)
- 📡 Zurich Acquires Beazley in $11 Billion Deal to Lead Cyberinsurance — SecurityWeek
- 🔓 LexisNexis says hackers accessed legacy data in contained breach — The Record (Recorded Future)
- ⚖️ Pentagon vendor cutoff exposes the AI dependency map most enterprises never built — VentureBeat Security
- 🚀 Startup JetStream Secures $34M Seed Round for AI Governance — BankInfoSecurity
- 🚨 CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog — The Hacker News
Full Transcript
Click to expand full episode transcript
Alex: Welcome to Cleartext. It's Wednesday, March fourth, twenty twenty-six. I'm Alex Chen.
Jordan: And I'm Jordan Reeves. So the US government apparently built an iOS exploit kit so good that it ended up in the hands of Russian hackers and then Chinese cybercriminals, and now potentially tens of thousands of iPhones are compromised. We'll get to that. But first, we need to talk about the fact that Cyber Command went offensive against Iran before the kinetic strikes, and the alliance forming in the aftermath might be the most consequential threat development of the year so far.
Alex: Big show today. We're covering the US cyber operations against Iran and the Russia-Iran threat actor convergence that's already spinning up. That iOS exploit kit proliferation story Jordan just mentioned. A massive deal reshaping cyber insurance. The Pentagon's Anthropic ban and what it reveals about AI supply chain blindness. A LexisNexis breach. A VMware Aria flaw you need to patch today. And a startup raising thirty-four million at seed for AI governance. Let's get into it.
Jordan: So Risky Business reported Monday that Cyber Command conducted offensive cyber operations ahead of the kinetic strikes on Iran. Communications disruption, surveillance support, the kind of battlefield preparation we've theorized about for years but rarely see confirmed this quickly. What's notable is the speed of attribution. The government wanted this known.
Alex: That's the signal, right? The messaging is deliberate. It says we have these capabilities and we will use them. But for CISOs, the immediate concern isn't the US offensive posture. It's the retaliation calculus. When you punch a nation-state in cyberspace ahead of bombing them, the cyber response is guaranteed.
Jordan: And it's already materializing. Cybersecurity Dive reported that pro-Russia actors have formed a loose alliance with Iran-linked hackers, specifically targeting critical infrastructure in the US and the Middle East. This isn't theoretical. These groups are actively collaborating right now.
Alex: This is what I'd call a cooperative threat model, and it changes the math for defenders. Historically you'd profile Iranian actors and Russian actors separately. Different TTPs, different tooling, different infrastructure. Now you've got Russian operational sophistication, think access brokering, initial access tradecraft, combined with Iranian persistence and destructive intent. The capability set broadens significantly.
Jordan: Right. Iranian groups have always been willing to go destructive. Shamoon, the Albania attacks. Russian groups bring better zero-days, better infrastructure, better operational security. You fuse those two and you get something that's harder to detect and more willing to cause damage. If you're a CISO in energy, water, transportation, defense industrial base, you should be elevating your threat monitoring posture today. Not next week. Today.
Alex: And talk to your threat intel providers. Make sure they're correlating across both actor sets, not siloing them.
Jordan: Now let's connect this to the iOS story because it's actually thematically related. CyberScoop reported on what researchers are calling the Coruna exploit kit. Twenty-three exploits across five chains targeting iOS thirteen through seventeen point two point one. Google's threat analysis group found it in the wild. Here's where it gets really uncomfortable. This kit was likely originally built for the US government. It moved from a spyware vendor's customer to Russian hackers to Chinese cybercriminals. And now it's being used at mass scale. Possibly tens of thousands of devices.
Alex: This is the proliferation problem we've been warning about for years. Government-grade exploits don't stay contained. They leak, they get stolen, they get resold. And when something this sophisticated hits the criminal ecosystem, your entire mobile threat model changes overnight.
Jordan: The sophistication here is real. Five separate exploit chains means redundancy. If one gets patched, the kit pivots to another. This isn't a single vulnerability. It's a platform. And most enterprise MDM deployments aren't configured to detect exploitation at this level. They'll enforce app policies, sure. But kernel-level compromise from a chain like this? Your MDM thinks everything is fine.
Alex: So what's the action? First, enforce iOS updates aggressively. Anything below seventeen point two point two should be off your network. Second, reassess your mobile threat defense tooling. If you don't have endpoint detection on mobile devices, this is the story that justifies the budget. Third, for high-value personnel, executives, board members, anyone with access to sensitive communications, consider dedicated secure devices with restricted app installation.
Jordan: And if you're in the defense supply chain, given the Iran context we just discussed, assume you're a target for exactly this kind of capability.
Alex: Let's shift to something that'll affect every CISO's budget conversation. Zurich is acquiring Beazley for eleven billion dollars. Beazley has been one of the most sophisticated and CISO-friendly cyber insurers in the market. Zurich is a global insurance giant. This creates a dominant player in cyber insurance.
Jordan: And dominant players set terms. That's the concern.
Alex: Exactly. When the deal closes, likely second half of this year, the combined entity will have enormous market power. I'd expect tighter underwriting standards, more prescriptive security control requirements, and potentially less flexibility on policy terms. If you've enjoyed Beazley's relatively progressive approach to cyber coverage, don't assume that survives integration with Zurich's risk appetite.
Jordan: Practically speaking, if your renewal is coming up in the next twelve months, start those conversations early. Lock in terms before the new entity starts flexing.
Alex: And use this as leverage in your board conversations. The insurance market is consolidating because the risk is real and growing. That's an argument for security investment, not against it.
Jordan: Now the Pentagon story. This one is going to resonate with every CISO listening. The federal government ordered all agencies to stop using Anthropic technology with a six-month phaseout. That's a significant mandate. But VentureBeat's reporting surfaces the real problem. Only fifteen percent of CISOs surveyed said they've mapped their AI vendor dependencies.
Alex: Fifteen percent. Let that sink in. Eighty-five percent of security leaders don't know where AI models are embedded in their environments. And these dependencies cascade. Your SaaS vendor uses Anthropic for a feature. Their vendor uses it for data processing. You have no visibility into any of it.
Jordan: This is shadow IT on steroids. At least with shadow IT, someone in the organization made a conscious decision to deploy something. With AI dependencies, your vendors are embedding models into products without telling you, sometimes without even updating their own documentation.
Alex: The federal ban is the canary in the coal mine. Today it's Anthropic and government agencies. Tomorrow it could be any AI provider and any regulatory jurisdiction. If the EU decides a particular model doesn't meet AI Act requirements, and that model is buried three layers deep in your supply chain, you have a compliance problem you don't even know about.
Jordan: So the action here is straightforward but hard. You need an AI dependency map. Not just what your organization has deployed directly, but what your vendors are using. Add AI model disclosure requirements to your vendor questionnaires. Make it part of procurement. And do it now, before you're scrambling with a six-month clock like the federal agencies.
Alex: Quick hit on the LexisNexis breach. A threat actor claims to have stolen two gigabytes of data including millions of records from legacy systems. LexisNexis says it's contained.
Jordan: LexisNexis holds legal, financial, and personal data on an enormous scale. If your organization uses their services, and many do for due diligence, background checks, legal research, you should be asking them directly what data was affected and whether your organization's information was in scope. Don't wait for the notification letter.
Alex: And this is yet another legacy data story. The attackers went after old systems. The data you forgot about is the data that gets stolen.
Jordan: The Leakbase takedown is worth noting. FBI and European law enforcement took down a major forum for stolen credentials and exploit code. Good news. But CISOs should check with their threat intel teams whether their organization's credentials appeared on Leakbase before it went dark. The data that was traded there is still out in the wild.
Alex: On vulnerabilities, CISA added CVE-2026-22719 to the Known Exploited Vulnerabilities catalog. It's a command injection flaw in VMware Aria Operations, CVSS eight point one. Unauthenticated remote code execution. It's being actively exploited.
Jordan: If you run Aria Operations, and a lot of enterprises do for infrastructure monitoring, patch immediately. Unauthenticated RCE in a monitoring platform means attackers get broad visibility into your environment the moment they're in. This is a priority one.
Alex: Last item. JetStream, a startup led by an ex-CrowdStrike product leader, raised thirty-four million at seed for AI governance tooling. They're targeting shadow AI, MCP server governance, and token-level spending controls.
Jordan: Thirty-four million at seed tells you where the smart money thinks the next budget line is forming. MCP server governance is a real emerging need. If you're evaluating tools in this space, JetStream is one to watch, but the market is moving fast. Don't buy the first thing you see.
Alex: Let's talk about the emerging theme. Jordan, the thread I see running through almost every story today is the collapse of containment assumptions.
Jordan: Explain that.
Alex: Cyber weapons built for the US government end up in Chinese criminal hands. AI models embedded by vendors cascade through supply chains invisibly. Russia and Iran fuse their threat capabilities in real time. Legacy data stores you thought were dormant get breached. The assumption that anything stays contained, tools, data, threats, alliances, that assumption is broken.
Jordan: I'd agree. And the operational implication is that static security models fail faster than ever. Your threat model from January is already wrong. Your vendor risk assessment from last quarter didn't account for AI dependencies. Your mobile security posture didn't anticipate a government-grade exploit kit going mass market.
Alex: So the mandate for CISOs right now is continuous reassessment. Not annual. Not quarterly. Continuous. Map your dependencies. Pressure-test your assumptions. And assume that whatever was contained yesterday is in the wild today.
Jordan: Watch the Iran retaliation space over the next seventy-two hours. If critical infrastructure operators aren't at heightened alert, they should be.
Alex: That's our show for Wednesday, March fourth. Thanks for listening to Cleartext.
Jordan: Stay sharp out there.
Cleartext is an automated daily podcast for CISOs and security leaders. Generated 2026-03-04.
Sources are pulled from: CyberScoop, The Record, SecurityWeek, Krebs on Security, Dark Reading, Cybersecurity Dive, BleepingComputer, Wired, Ars Technica, TechCrunch, Help Net Security, VentureBeat, Risky Business News, The Hacker News, CISA, and BankInfoSecurity.