Cleartext Week in Review – March 14, 2026
Saturday, March 14, 2026·10:17
Enjoy the show? Subscribe to never miss an episode.
show notes
Cleartext – March 14, 2026
Daily cybersecurity briefing for CISOs and security leaders.
Episode Summary
Today's episode covers 18 stories across 6 topic areas, including: Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker; US entities face heightened cyber risk related to Iran war; Iran MOIS Colludes With Criminals to Boost Cyberattacks.
Stories Covered
🌍 Geopolitical
Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
Krebs on Security · Mar 11 · Relevance: ██████████ 10/10
Why it matters to CISOs: A destructive wiper attack attributed to Iranian state-linked actors against a major U.S. medical device manufacturer demonstrates that healthcare supply chains are now direct targets in geopolitical conflicts. CISOs in healthcare and manufacturing must urgently reassess their resilience against wiper-style attacks.
- Pro-Iran Handala group claims responsibility for data-wiping attack on Stryker
- Over 5,000 workers sent home from Stryker's Ireland hub; U.S. headquarters reported a building emergency
- Attack claimed as retaliation for U.S. military strike on Tehran
US entities face heightened cyber risk related to Iran war
Cybersecurity Dive · Mar 10 · Relevance: █████████░ 9/10
Why it matters to CISOs: The broader Iran conflict is elevating cyber risk across U.S. critical infrastructure, local government, and major enterprises — CISOs need to operationalize threat intelligence around Iranian TTPs and ensure heightened monitoring postures.
- Military campaign against Iran is putting U.S. critical infrastructure at heightened risk
- Local governments and major companies face increased threat of disruptive attacks
- Iran-linked groups using DDoS, phishing, and retaliatory techniques against U.S. targets
Iran MOIS Colludes With Criminals to Boost Cyberattacks
Dark Reading · Mar 12 · Relevance: ████████░░ 8/10
Why it matters to CISOs: Iran's intelligence service is now actively collaborating with cybercriminal groups, blurring the line between state-sponsored and criminal activity and complicating attribution and response for security teams.
- Iranian APTs historically pretended to be cybercriminal groups; now they partner with actual criminal groups
- MOIS collaboration expands operational capabilities of Iranian cyber campaigns
- Complicates threat attribution for defenders
Risky Bulletin: Gen. Joshua Rudd confirmed as next CyberCom and NSA head
Risky Business News · Mar 10 · Relevance: ███████░░░ 7/10
Why it matters to CISOs: New leadership at NSA/CyberCom will shape the U.S. government's offensive and defensive cyber posture, including public-private partnerships that directly affect enterprise security strategies.
- Senate confirmed Gen. Joshua Rudd as new CyberCom and NSA chief
- U.S. will establish an inter-agency cyber unit
- Coruna iOS hacking kit traced to L3Harris defense contractor
Officials worry Salt Typhoon apathy is killing momentum for tougher telecom security rules
CyberScoop · Mar 12 · Relevance: ███████░░░ 7/10
Why it matters to CISOs: Waning public attention on Salt Typhoon threatens to stall critical telecom security regulation. CISOs at telcos and enterprises dependent on telecom infrastructure should advocate for stronger baseline security requirements.
- Cyber officials say it's challenging to make the public appreciate the gravity of Salt Typhoon
- Momentum for tougher telecom security rules is fading
- China-linked group previously compromised major U.S. telecom networks
📡 Macro Trends
Interpol's 'Operation Synergia III' Nets 94 Arrests in Major Cybercrime Sweep
Infosecurity Magazine · Mar 13 · Relevance: ███████░░░ 7/10
Why it matters to CISOs: Major international law enforcement action disrupts phishing and ransomware infrastructure at scale, demonstrating increased global coordination that may temporarily reduce certain threat actor activity.
- 94 arrests across 72 countries and territories
- 45,000 malicious IP addresses taken down
- Targeted phishing, malware, and ransomware operations
Authorities dismantle SocksEscort proxy network behind millions in fraud
Help Net Security · Mar 13 · Relevance: ███████░░░ 7/10
Why it matters to CISOs: Takedown of a 369,000-device residential proxy botnet removes infrastructure that enabled cybercriminals to mask attacks. CISOs should check for compromised edge devices in their environments.
- SocksEscort exploited compromised home routers in 163 countries
- 34 domains and 23 servers seized; $3.5M in crypto frozen
- Network claimed about 369,000 victims
AI coding agents keep repeating decade-old security mistakes
Help Net Security · Mar 13 · Relevance: ███████░░░ 7/10
Why it matters to CISOs: As AI coding agents enter production workflows, they're introducing known vulnerability classes at high rates. CISOs must mandate security review gates for AI-generated code before it reaches production.
- DryRun Security report shows AI coding agents introduce vulnerabilities at high rates
- Agents miss adding security components across nearly every application type
- Claude Code, OpenAI Codex, and Google Gemini agents all affected
🔓 Data Breach
Ransomware incident responder gave info to BlackCat cybercriminals during negotiations, DOJ alleges
The Record (Recorded Future) · Mar 13 · Relevance: ████████░░ 8/10
Why it matters to CISOs: An incident responder allegedly played both sides — conducting attacks and negotiating for victims simultaneously. CISOs must vet IR providers rigorously and implement controls to verify integrity of third-party responders during active incidents.
- DOJ accused an incident responder of conducting cyberattacks and helping ransomware gangs
- Responder allegedly helped negotiate higher payouts from victims he was working for
- Tied to BlackCat/ALPHV ransomware operations
DOGE employee stole Social Security data and put it on a thumb drive, report says
TechCrunch Security · Mar 10 · Relevance: ████████░░ 8/10
Why it matters to CISOs: Insider threat from a government efficiency initiative highlights the persistent risk of privileged access abuse and inadequate data loss prevention controls, especially during organizational transitions.
- Whistleblower accuses former DOGE member of stealing Americans' personal data from Social Security Administration
- Data reportedly copied to a thumb drive
- Intended for use at a new job
AI-generated Slopoly malware used in Interlock ransomware attack
BleepingComputer · Mar 12 · Relevance: ███████░░░ 7/10
Why it matters to CISOs: AI-generated malware is now being used in real ransomware attacks, lowering the barrier for threat actors and complicating detection. Security teams should update detection models to account for AI-written code patterns.
- Slopoly malware likely created using generative AI tools
- Used in Interlock ransomware attack for over a week of persistent access
- IBM researchers described it as unsophisticated but operationally effective
Salesforce issues new security alert tied to third customer attack spree in six months
CyberScoop · Mar 11 · Relevance: ███████░░░ 7/10
Why it matters to CISOs: Third wave of attacks exploiting Salesforce Experience Cloud misconfigurations in six months signals a systemic issue. CISOs must audit their Salesforce configurations and guest user permissions immediately.
- Third attack spree targeting Salesforce customers in six months
- Threat group associated with ShinyHunters
- Exploits overly permissive Experience Cloud guest user configurations
⚖️ Governance & Policy
Trump's Cyber Strategy Puts Private Sector on the Offensive
BankInfoSecurity · Mar 15 · Relevance: █████████░ 9/10
Why it matters to CISOs: The new national cyber strategy envisions private-sector participation in offensive operations, raising profound liability, oversight, and legal questions that CISOs and general counsels must begin planning for now.
- Strategy calls for stronger federal-private partnership including offensive cyber operations
- Raises hard questions about execution, liability, and oversight
- Heralds a shift in how private enterprise could participate against nation-state adversaries and ransomware gangs
When Liability Turns the CISO Into the Fall Guy
BankInfoSecurity · Mar 15 · Relevance: ████████░░ 8/10
Why it matters to CISOs: Directly addresses the growing personal liability risk for CISOs post-breach, which is changing how security leaders report risk and making the role less attractive — a board-level conversation topic.
- Regulators are increasingly pursuing personal accountability after major breaches
- Growing liability risk is weakening security culture
- Experienced practitioners are becoming reluctant to take CISO roles
🚀 Startup Ecosystem
Google completes $32B acquisition of Wiz
Cybersecurity Dive · Mar 11 · Relevance: █████████░ 9/10
Why it matters to CISOs: The largest cybersecurity acquisition in history reshapes the cloud security market. CISOs using Wiz or competing products should assess how Google Cloud integration will affect multi-cloud strategy and vendor lock-in risk.
- Google closed $32 billion all-cash acquisition of Wiz
- Wiz will continue to operate under its own brand across multiple platforms
- Largest acquisition in Google's history
Mandiant’s founder just raised $190M for his autonomous AI agent security startup
TechCrunch Security · Mar 10 · Relevance: ███████░░░ 7/10
Why it matters to CISOs: Kevin Mandia's new $190M-funded startup Armadin signals major VC confidence in autonomous AI-driven security operations, which could reshape how SOCs operate within the next 2-3 years.
- Kevin Mandia founded Armadin to create autonomous cybersecurity agents
- Raised $190M in funding
- Software designed to learn and respond to threats without human intervention
🚨 Critical Vulnerability
CISA Issues Emergency Directive Over Exploited Cisco SD-WAN Flaws
Infosecurity Magazine · Mar 12 · Relevance: ████████░░ 8/10
Why it matters to CISOs: CISA emergency directives signal the highest urgency — organizations running Cisco SD-WAN must treat this as a top-priority patching event given confirmed active exploitation granting admin-level network access.
- CISA issued emergency directive for actively exploited Cisco SD-WAN vulnerabilities
- Exploitation grants attackers admin access to networks
- CISA requesting device logs from affected organizations
Google Fixes Two Chrome Zero-Days Exploited in the Wild Affecting Skia and V8
The Hacker News · Mar 13 · Relevance: ███████░░░ 7/10
Why it matters to CISOs: Two actively exploited Chrome zero-days require immediate patching across the enterprise. Browser-based exploitation remains a top initial access vector.
- CVE-2026-3909 (CVSS 8.8): out-of-bounds write in Skia graphics library
- Both vulnerabilities confirmed exploited in the wild
- Emergency security updates released by Google
Further Reading
- 🌍 Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker — Krebs on Security
- 🌍 US entities face heightened cyber risk related to Iran war — Cybersecurity Dive
- 🌍 Iran MOIS Colludes With Criminals to Boost Cyberattacks — Dark Reading
- 🌍 Risky Bulletin: Gen. Joshua Rudd confirmed as next CyberCom and NSA head — Risky Business News
- 🌍 Officials worry Salt Typhoon apathy is killing momentum for tougher telecom security rules — CyberScoop
- 📡 Interpol's 'Operation Synergia III' Nets 94 Arrests in Major Cybercrime Sweep — Infosecurity Magazine
- 📡 Authorities dismantle SocksEscort proxy network behind millions in fraud — Help Net Security
- 📡 AI coding agents keep repeating decade-old security mistakes — Help Net Security
- 🔓 Ransomware incident responder gave info to BlackCat cybercriminals during negotiations, DOJ alleges — The Record (Recorded Future)
- 🔓 DOGE employee stole Social Security data and put it on a thumb drive, report says — TechCrunch Security
- 🔓 AI-generated Slopoly malware used in Interlock ransomware attack — BleepingComputer
- 🔓 Salesforce issues new security alert tied to third customer attack spree in six months — CyberScoop
- ⚖️ Trump's Cyber Strategy Puts Private Sector on the Offensive — BankInfoSecurity
- ⚖️ When Liability Turns the CISO Into the Fall Guy — BankInfoSecurity
- 🚀 Google completes $32B acquisition of Wiz — Cybersecurity Dive
- 🚀 Mandiant’s founder just raised $190M for his autonomous AI agent security startup — TechCrunch Security
- 🚨 CISA Issues Emergency Directive Over Exploited Cisco SD-WAN Flaws — Infosecurity Magazine
- 🚨 Google Fixes Two Chrome Zero-Days Exploited in the Wild Affecting Skia and V8 — The Hacker News
Full Transcript
Click to expand full episode transcript
Jordan: This week, a wiper attack hit Stryker. A medical device company. Thousands of workers sent home. And the group claiming credit said it was retaliation for a U.S. military strike on Tehran. If you needed a single moment that crystallized where we are in 2026, that was it. Geopolitics is no longer background noise for security teams. It is the job.
Alex: Welcome to Cleartext. I'm Alex Chen. It's Saturday, March 14th, and this is your week in review. If the daily episodes got away from you this week, no judgment — it was a lot. Here's what mattered and what it means going into next week. We're going to cover four major themes: the Iran threat elevation and what it means for your posture right now; a governance story that should be sitting on every CISO's desk — and every general counsel's; a market-moving acquisition that reshapes cloud security; and a set of breach and vulnerability stories that collectively tell you something important about where your defenses may be soft. Jordan, let's start with Iran.
Jordan: So the Stryker story broke Tuesday via Krebs, and it's the kind of story that gets your attention fast. The pro-Iran Handala group is claiming a wiper attack against one of the largest medical device manufacturers in the world. More than five thousand workers sent home from Stryker's Ireland hub. Their U.S. headquarters reportedly had a building emergency. And the framing from Handala was explicit — this is retaliation for U.S. military action against Tehran.
Alex: And this didn't happen in a vacuum. The day before, Cybersecurity Dive had a piece laying out the broader threat elevation picture — critical infrastructure, local governments, major enterprises all flagged as being at heightened risk from Iranian cyber actors. CISA had been making noise about this, and then Stryker happens and suddenly the threat briefings feel very concrete.
Jordan: What makes this week different from prior Iran threat cycles is the Stryker attack itself, but also a third story that came out of Dark Reading on Wednesday. Iran's Ministry of Intelligence is now actively partnering with actual criminal groups. Not impersonating them — partnering with them. That is a meaningful operational shift. Historically Iranian APTs dressed up as criminals for plausible deniability. Now they're getting real criminal infrastructure, real criminal tradecraft. Attribution becomes harder, response becomes more complicated, and the attack surface just got wider.
Alex: So what do you do with this as a CISO? Because I've seen some organizations this week who are treating this as a background threat advisory. I don't think that's the right posture.
Jordan: It's not. The practical playbook here is pretty clear. Review your Iranian TTP coverage — CISA has updated guidance, there are fresh indicators from the Stryker incident that are circulating. Make sure you have visibility into your OT and critical systems because that's where wiper attacks do maximum damage. And honestly, if you're in healthcare, manufacturing, defense industrial base, or critical infrastructure — your board needs to hear from you about this before they read about it in the Wall Street Journal.
Alex: The Stryker attack is also a healthcare supply chain story. Medical device manufacturers sit at the intersection of operational technology, patient safety, and manufacturing. A wiper attack doesn't just disrupt IT — it can halt production of devices that are in clinical use. That is a material safety issue, not just a cyber issue. And that distinction matters enormously when you're talking to your board and your legal team.
Jordan: One more thread here — Salt Typhoon. CyberScoop ran a piece midweek about officials worried that momentum for tougher telecom security rules is fading because the public has moved on. And I find that maddening. Salt Typhoon was one of the most significant espionage operations ever conducted against U.S. telecom infrastructure. The fact that news cycles don't care about it anymore doesn't mean the risk went away. CISOs at telcos, and frankly anyone deeply dependent on telecom infrastructure, should be actively advocating for stronger baseline requirements, not waiting for regulation to force it.
Alex: Let's move to governance, because there were two stories this week that I think deserve to be read together. The first is the new national cyber strategy out of the Trump administration. BankInfoSecurity had solid coverage on it — the headline is that the strategy envisions private-sector participation in offensive cyber operations. Stronger federal-private partnership, potentially including going on offense against nation-state adversaries and ransomware gangs.
Jordan: Which sounds great until you think about it for thirty seconds. Who authorizes the operation? Who's liable when it goes wrong? What happens when a private company conducts an offensive action and it's misattributed? These are not hypotheticals — these are the hard questions that general counsels are going to be asking, and right now there are no good answers in the public record.
Alex: The second governance story is more personal and frankly more urgent for people in this audience. The CISO liability piece. Regulators are increasingly pursuing personal accountability after major breaches. And the consequence that the piece in BankInfoSecurity laid out is something I hear in private conversations all the time — experienced practitioners are becoming reluctant to take CISO roles. When the downside scenario of doing your job is a federal prosecution, you have to think hard about whether you want to sit in that chair.
Jordan: And the chilling effect on risk reporting is real. If CISOs are afraid that accurate, honest risk documentation becomes evidence in a prosecution, they start hedging. They write for the lawyers, not for the board. Which means boards get worse information. Which means worse decisions. It's a negative feedback loop that ultimately makes everyone less secure.
Alex: The legal and liability exposure question and the offensive operations question are actually connected. Both are about the expanding scope of what CISOs are responsible for without a corresponding expansion of authority or protection. If you don't have a current conversation happening with your board, your general counsel, and your D&O insurer about personal liability, that is the call to schedule Monday morning.
Jordan: Let's talk about the market. Google closed the Wiz acquisition this week. Thirty-two billion dollars, all cash. Largest acquisition in Google's history. Largest cybersecurity acquisition ever. Full stop.
Alex: Here's what I'd tell any CISO using Wiz right now: Google has explicitly said Wiz will continue operating under its own brand across multiple cloud platforms. They're not pulling it behind a Google Cloud wall — at least not yet. But the vendor relationship just changed materially. Your Wiz rep now works for Google. Your renewal conversations happen in a different context. Multi-cloud neutrality is the stated promise; vendor lock-in risk is the real question to press on in your next QBR.
Jordan: And for CISOs not using Wiz — competitive displacement is coming. When a thirty-two billion dollar acquisition closes, the category consolidates around it. Whatever your current CSPM or cloud security stack looks like, expect a more aggressive competitive environment in the next twelve months.
Alex: Kevin Mandia also raised a hundred and ninety million for Armadin this week — autonomous AI security agents for the SOC. Mandiant's founder putting that kind of capital behind fully autonomous threat response is a signal worth watching. We're not there yet, but this is what your SOC looks like in three years if the technology delivers.
Jordan: Now let's run through the breach and vulnerability picture quickly because there's a lot here. The Cisco SD-WAN emergency directive from CISA is a top-priority patching event — admin-level access via confirmed active exploitation. If you haven't pushed that through your change management process already, that's the first thing Monday morning. And two Chrome zero-days were patched Thursday, both confirmed exploited in the wild. Browser-based initial access is never going away. Make sure your patch deployment isn't lagging on endpoints.
Alex: The Salesforce story is one I want to linger on for ten seconds because this is now the third wave of attacks exploiting Experience Cloud misconfigurations in six months. Three waves. Same vector. Same ShinyHunters-linked group. At some point this is no longer a Salesforce problem — it's a configuration governance problem. If you haven't audited your guest user permissions and your Experience Cloud settings, that's overdue.
Jordan: The incident responder story out of The Record is disturbing and important. DOJ alleging that an IR firm employee was conducting attacks and then negotiating higher ransomware payouts from the same victims he was supposedly helping. This is a supply chain trust problem wearing a different suit. How do you vet the people you call when everything is on fire? The answer can't just be reputation. You need contractual controls, independent verification of responder actions during active incidents, and honestly a pre-established relationship with law enforcement so you have a second channel that's not going through your IR provider.
Alex: And the AI-generated malware story from BleepingComputer deserves a mention. Slopoly — a piece of malware used in an Interlock ransomware attack, almost certainly written with generative AI, described by IBM researchers as unsophisticated but operationally effective. That last part is what matters. You don't need sophisticated malware to maintain persistent access for a week and exfiltrate data. The barrier to entry for building functional malware just got lower in a way that's permanent and irreversible.
Jordan: Which connects to the AI coding agents story — DryRun Security's report showing that Claude Code, OpenAI Codex, Gemini agents — all of them introduce known vulnerability classes at high rates into production code. Both stories point in the same direction: AI is accelerating both the attack side and the development side, and security is not keeping pace in either direction.
Alex: So let's step back. What was this week?
Jordan: This week was the moment the geopolitical threat became undeniable and operational. Stryker is a Fortune 500 company. They make surgical robots and orthopedic implants. They got wiped. When that's your threat landscape, the conversation about whether geopolitical cyber risk is a "them problem" is over.
Alex: The through-line I keep coming back to is accountability without authority. CISOs are being asked to defend against nation-state wiper attacks, prepare for a national strategy that might involve offensive operations, manage personal legal liability, vet their own incident responders for corruption — all while patching emergency Cisco vulnerabilities and cleaning up Salesforce misconfigurations. The scope is expanding. The personal risk is expanding. And in most organizations, the authority and the resources are not expanding at the same rate.
Jordan: If you take one thing into your week: the Iran threat is not a news story to monitor. It is an active operational threat requiring an active operational response. Review your wiper resilience. Review your backup architecture. Review your OT segmentation. And brief your board before they ask you.
Alex: The daily show is back Monday. We'll be watching what Stryker discloses over the weekend, whether any other organizations surface as Iran-linked wiper targets, and what the first real implementation questions around the new national cyber strategy look like when they hit the Hill next week. Until then, thanks for spending part of your Saturday with us. Stay sharp.
Jordan: Stay sharp.
Cleartext is an automated daily podcast for CISOs and security leaders. Generated 2026-03-14.
Sources are pulled from: CyberScoop, The Record, SecurityWeek, Krebs on Security, Dark Reading, Cybersecurity Dive, BleepingComputer, Wired, Ars Technica, TechCrunch, Help Net Security, VentureBeat, Risky Business News, The Hacker News, CISA, and BankInfoSecurity.