Cleartext logocleartext_
week in review

Cleartext Week in Review – March 28, 2026

Saturday, March 28, 2026·9:12

Cleartext Week in Review – March 28, 2026
9:12·5.5 MB

Enjoy the show? Subscribe to never miss an episode.

show notes

Cleartext – March 28, 2026

Daily cybersecurity briefing for CISOs and security leaders.

🎧 Listen to this episode

Episode Summary

Today's episode covers 17 stories across 5 topic areas, including: DarkSword’s GitHub leak threatens to turn elite iPhone hacking into a tool for the masses; Coruna, DarkSword & Democratizing Nation-State Exploit Kits; FBI confirms theft of director’s personal emails by Iran-linked hacking group.

Stories Covered

🌍 Geopolitical

DarkSword’s GitHub leak threatens to turn elite iPhone hacking into a tool for the masses

CyberScoop · Mar 24 · Relevance: █████████░ 9/10

Why it matters to CISOs: Nation-state iOS exploit kits are now publicly available, dramatically lowering the barrier for targeting executive and VIP devices. CISOs should enforce device update policies and evaluate Lockdown Mode for high-risk personnel.

  • DarkSword iOS exploit kit leaked on GitHub
  • Linked to Coruna framework and 2023 Operation Triangulation campaign
  • Puts hundreds of millions of iOS 18 devices running older software at risk

📖 Read full article

Coruna, DarkSword & Democratizing Nation-State Exploit Kits

Dark Reading · Mar 26 · Relevance: ████████░░ 8/10

Why it matters to CISOs: The convergence of leaked nation-state tools being sold on dark web and appearing on GitHub means enterprise mobile threat models need urgent revision — sophisticated exploits are no longer reserved for APTs.

  • Nation-state malware sold on Dark Web and leaked to GitHub
  • Kaspersky linked Coruna to Operation Triangulation code
  • Ordinary organizations may lack defenses against these tools

📖 Read full article

FBI confirms theft of director’s personal emails by Iran-linked hacking group

The Record (Recorded Future) · Mar 27 · Relevance: ████████░░ 8/10

Why it matters to CISOs: The breach of the FBI director's personal email by Iranian hackers underscores that personal accounts of senior leaders are prime targets — CISOs should ensure executive protection programs cover personal digital footprints.

  • Iranian group Handala breached FBI Director Kash Patel's personal Gmail
  • FBI says information was 'historical in nature' with no government data taken
  • Highlights persistent Iranian cyber operations targeting US officials

📖 Read full article

China Upgrades the Backdoor It Uses to Spy on Telcos Globally

Dark Reading · Mar 27 · Relevance: ████████░░ 8/10

Why it matters to CISOs: China's Red Menshen upgrading BPFdoor to defeat traditional defenses in telecom networks is a direct threat to any organization relying on telecom infrastructure. CISOs in critical infrastructure should deploy the newly released detection tools.

  • Red Menshen's BPFdoor malware upgraded to defeat traditional cybersecurity protections
  • Targets telecom networks globally for espionage against government networks
  • Rapid7 released a scanning script to detect stealthy BPFdoor implants

📖 Read full article

Former NSA chiefs worry American offensive edge in cybersecurity is slipping

CyberScoop · Mar 26 · Relevance: ███████░░░ 7/10

Why it matters to CISOs: Former NSA directors warning that the US offensive cyber edge is slipping signals that enterprises may face more sophisticated nation-state threats with less government deterrence. This changes the calculus for threat modeling at the board level.

  • Four former NSA chiefs warn US offensive cyber capabilities are eroding
  • Systemic numbness to cyberattacks has exposed the US economy
  • Retired four-star officials say 'the worst day in cyber is yet to come'

📖 Read full article

📡 Macro Trends

Security leaders say the next two years are going to be ‘insane’

CyberScoop · Mar 27 · Relevance: █████████░ 9/10

Why it matters to CISOs: Mandia, Stamos, and Adamski warning that AI is finding bugs faster than anyone can fix them should reshape how CISOs think about vulnerability management cadence and AI-augmented threat modeling.

  • Kevin Mandia, Alex Stamos, Morgan Adamski warn AI is accelerating exploit development
  • AI finding vulnerabilities faster than organizations can patch
  • Most organizations are not prepared for the pace of change

📖 Read full article

Google moves post-quantum encryption timeline up to 2029

CyberScoop · Mar 25 · Relevance: ████████░░ 8/10

Why it matters to CISOs: Google accelerating its PQC migration to 2029 (from 2035) signals that 'harvest now, decrypt later' threats are being taken seriously at the highest levels. CISOs need to begin crypto agility assessments now.

  • Google moved its post-quantum cryptography migration deadline from 2035 to 2029
  • Signals concern that quantum threats are materializing faster than expected
  • Enterprises need migration strategies before the window closes

📖 Read full article

🔓 Data Breach

Experts warn of a ‘loud and aggressive’ extortion wave following Trivy hack

CyberScoop · Mar 24 · Relevance: █████████░ 9/10

Why it matters to CISOs: The TeamPCP supply chain campaign hit Trivy, KICS, LiteLLM, and now Telnyx — security scanners and dev tools your teams trust implicitly. CISOs must audit CI/CD pipelines and verify the integrity of open-source dependencies immediately.

  • Mandiant warns fallout could impact up to 10,000 downstream victims
  • TeamPCP compromised Trivy, Checkmarx KICS, LiteLLM, and Telnyx packages
  • Credential-stealing malware deployed through trusted CI/CD workflows

📖 Read full article

TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 via Trivy CI/CD Compromise

The Hacker News · Mar 24 · Relevance: ████████░░ 8/10

Why it matters to CISOs: LiteLLM is widely used for AI/LLM orchestration — its compromise means credential harvesters and Kubernetes lateral movement tools may already be in AI development environments. Security teams should scan for affected versions and rotate secrets.

  • Malicious litellm versions 1.82.7 and 1.82.8 pushed to PyPI
  • Contained credential harvester, K8s lateral movement toolkit, and persistent backdoor
  • Attack chain originated from prior Trivy CI/CD compromise

📖 Read full article

European Commission confirms cyberattack after hackers claim data breach

TechCrunch Security · Mar 27 · Relevance: ████████░░ 8/10

Why it matters to CISOs: A breach of the EU's executive body via cloud infrastructure highlights that even the most prominent institutions are vulnerable — reinforces the need for cloud security posture management and third-party risk controls.

  • Hackers gained access to European Commission's Amazon cloud environment
  • Stolen data reportedly includes reams of information from cloud storage
  • Investigation is ongoing

📖 Read full article

Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse

The Hacker News · Mar 25 · Relevance: ███████░░░ 7/10

Why it matters to CISOs: Device code phishing exploiting OAuth flows is hitting Microsoft 365 at scale across 340+ orgs — CISOs should review conditional access policies and consider restricting device code authentication flows.

  • Campaign targets Microsoft 365 across 340+ organizations in 5 countries
  • Uses device code phishing leveraging OAuth abuse
  • Active since February 2026 with accelerating pace

📖 Read full article

⚖️ Governance & Policy

FCC Bans New Foreign-Made Routers Over Supply Chain and Cyber Risk Concerns

The Hacker News · Mar 25 · Relevance: ████████░░ 8/10

Why it matters to CISOs: The FCC's blanket ban on foreign-made consumer routers will ripple through enterprise supply chains and SOHO environments. CISOs need to assess router inventory and prepare for potential procurement disruptions.

  • FCC banned import of all new foreign-made consumer routers
  • Cites 'unacceptable' risks to cyber and national security
  • Follows years of state-linked attacks targeting routers and edge devices

📖 Read full article

US Treasury Weighs Cyber Insurance Backstop

BankInfoSecurity · Mar 28 · Relevance: ███████░░░ 7/10

Why it matters to CISOs: A federal cyber insurance backstop would fundamentally change the risk transfer calculus. CISOs should track this closely as it could affect cyber insurance availability, pricing, and the security controls insurers require.

  • Treasury reviewing cyber risk under the Terrorism Risk Insurance Program
  • Concern that nation-state attacks may overwhelm private insurers
  • Could lead to federal backstop for critical infrastructure protection

📖 Read full article

When Liability Turns the CISO Into the Fall Guy

BankInfoSecurity · Mar 28 · Relevance: ███████░░░ 7/10

Why it matters to CISOs: Directly relevant to every CISO — growing personal liability after breaches is reshaping how security leaders report risk, and making the role less attractive to experienced practitioners. D&O coverage and reporting structures need review.

  • Regulators increasingly pursuing personal accountability after major breaches
  • CISOs face growing personal liability risk
  • Trend is weakening security culture and deterring experienced talent

📖 Read full article

Europe Girds for Looming IoT Security Regulations

BankInfoSecurity · Mar 28 · Relevance: ██████░░░░ 6/10

Why it matters to CISOs: The EU Cyber Resilience Act implementation deadlines are approaching and will affect any organization selling connected products into Europe. CISOs at manufacturers need to assess compliance readiness now.

  • European Commission published draft guidance for the Cyber Resilience Act
  • Key implementation deadlines looming
  • Draft guidance may help manufacturers comply but has limitations

📖 Read full article

🚨 Critical Vulnerability

Attackers are exploiting RCE vulnerability in BIG-IP APM systems (CVE-2025-53521)

Help Net Security · Mar 28 · Relevance: ████████░░ 8/10

Why it matters to CISOs: Active exploitation of a critical F5 BIG-IP RCE flaw tied to a nation-state threat actor demands immediate patching. BIG-IP sits at network perimeters — compromise gives attackers direct access to internal networks.

  • CVE-2025-53521 (CVSS 9.3) actively exploited in the wild
  • CISA added to KEV catalog
  • Originally linked to a 'highly sophisticated nation-state threat actor'

📖 Read full article

CISA: New Langflow flaw actively exploited to hijack AI workflows

BleepingComputer · Mar 26 · Relevance: ███████░░░ 7/10

Why it matters to CISOs: AI workflow tools like Langflow being exploited within hours of disclosure illustrates that AI infrastructure is now a first-class attack surface. CISOs deploying AI tooling need to treat it with the same rigor as production systems.

  • CVE-2026-33017 code injection vulnerability in Langflow actively exploited
  • Attackers pounced within hours of disclosure
  • CISA added to KEV catalog with April remediation deadline

📖 Read full article


Further Reading


Full Transcript

Click to expand full episode transcript

Jordan: This week, nation-state exploit kits showed up on GitHub. Let that sink in for a second. Tools that two years ago required the resources of a foreign intelligence service — available to anyone with a browser. That's the week in one sentence. But it didn't stop there.

Alex: Welcome back to Cleartext. I'm Alex Chen. It's Saturday, March 28th, and if you had a real week — board prep, budget fights, maybe a fire drill or two — and couldn't keep up with the daily show, this is your catch-up. Here's what mattered and what it means going into next week. We've got four major threads to pull on today: the democratization of nation-state offensive tools and what that means for your threat model, a supply chain attack that hit the tools your developers trust most, a governance and liability landscape that is shifting fast under our feet, and a vulnerability picture that is getting harder to manage by the day. Jordan, let's get into it.

Jordan: Let's start where the week started — with DarkSword. A threat actor leaked the DarkSword iOS exploit kit on GitHub. This is tooling that researchers have linked to the Coruna framework and Operation Triangulation, the 2023 campaign that hit iPhones belonging to senior government officials and diplomats. That campaign took Kaspersky months to reverse engineer. Now the toolkit is sitting in a public repository. Kaspersky has confirmed the Coruna connection. Hundreds of millions of iOS 18 devices running older software are in scope.

Alex: And the Dark Reading follow-up this week made the business implication crystal clear. This isn't just a technical event. This is a market structure change. When a capability crosses from nation-state-only to widely available, your threat model doesn't just shift incrementally — it breaks. The adversary pool just expanded by orders of magnitude. If you have executives, board members, or VIPs running iPhones and you haven't enforced an update policy and evaluated Lockdown Mode for your highest-risk personnel, that is now a governance gap, not just an IT gap.

Jordan: The FBI director's personal Gmail got compromised by Iranian group Handala this week. The FBI says the data was historical, no government information taken. But set aside what was taken for a second. The story is who was targeted and how. Personal accounts of senior officials are intelligence collection targets. Always have been. What's changed is the tempo and the breadth. If you don't have an executive digital protection program that covers personal accounts — not just corporate ones — you are leaving your most visible people exposed. A CISO's job now includes the personal digital footprint of the leadership team. That is the new normal.

Alex: And then there's BPFdoor. China's Red Menshen upgraded their BPFdoor malware this week — the implant they use for persistent access inside telecom networks. The upgrade is specifically designed to defeat traditional detection methods. Rapid7 released a scanning script, which is helpful, but let's be honest about what this tells us. This is patient, sophisticated infrastructure espionage. Any organization that depends on telecom infrastructure — which is everyone — has a stake in this. If you're in critical infrastructure, deploy the detection tooling. If you're not, understand that the networks your operations flow through are actively compromised in ways that are hard to find.

Jordan: I want to zoom out for a second, because all of this has a macro context that dropped this week. Four former NSA directors went on record saying the U.S. offensive cyber edge is slipping. Four-star retired officials using the phrase "the worst day in cyber is yet to come." That is not theater. When the people who built and ran the most capable cyber organization on the planet say deterrence is eroding — and that systemic numbness to attacks has left the economy exposed — that changes the board-level conversation. The implicit government backstop that some enterprises have assumed exists is getting smaller. CISOs need to own that in their risk framing.

Alex: Which connects directly to the macro story that may have the longest tail of anything this week. Kevin Mandia, Alex Stamos, Morgan Adamski — three people who have seen the inside of some of the worst incidents of the last decade — all said publicly this week that the next two years are going to be, their word, insane. The specific mechanism is AI. AI is finding vulnerabilities faster than organizations can patch them. Exploit development timelines are compressing. The gap between disclosure and weaponization — which we'll come back to — is now measured in hours, not days. If your vulnerability management program is built around a monthly patching cadence, it was designed for a different era.

Jordan: Let's talk about the supply chain story, because this one deserves more attention than it got. TeamPCP compromised Trivy — the open-source container scanning tool — through its CI/CD pipeline, and then used that access to push malicious versions of downstream packages. LiteLLM, which is widely used for AI and LLM orchestration, got backdoored. Versions 1.82.7 and 1.82.8 on PyPI contained a credential harvester, a Kubernetes lateral movement toolkit, and a persistent backdoor. Checkmarx KICS and Telnyx packages were also hit. Mandiant estimates up to ten thousand downstream victims.

Alex: Here's what makes this one particularly sharp. Trivy is a security tool. It's in your CI/CD pipeline specifically because you trust it. LiteLLM is in your AI development stack. These are not peripheral dependencies — they are the infrastructure your teams use to build and secure software. The attack surface has moved up the stack into the toolchain itself. If you haven't audited your CI/CD dependencies and rotated secrets in environments where these packages ran, that needs to happen this weekend. Not Monday — this weekend.

Jordan: On the breach front, the European Commission confirmed this week that hackers accessed its Amazon cloud environment and exfiltrated data from cloud storage. Investigation is ongoing. The specifics are thin, but the headline is not. The executive body of the European Union got breached through its cloud infrastructure. If that's not an argument for cloud security posture management and aggressive third-party risk controls, I don't know what is. And separately, a device code phishing campaign has hit more than 340 Microsoft 365 organizations across five countries since February, abusing OAuth flows. This one is still active and accelerating. Review your conditional access policies and look hard at whether device code authentication flows are necessary in your environment.

Alex: Now let's spend a few minutes on governance, because the week had some real signal in that space. The FCC banned the import of new foreign-made consumer routers. The framing was national security and supply chain risk. The practical implication for enterprises extends to SOHO environments — remote workers, branch offices, the edges of your network that you don't fully control. Procurement pipelines for network hardware need a review. And the EU Cyber Resilience Act is getting closer — the Commission published draft implementation guidance this week. If you're in manufacturing or you sell connected products into Europe, compliance readiness is not a future problem anymore.

Jordan: But the two governance stories I'd put in front of every CISO this weekend are the Treasury cyber insurance backstop review and the liability piece. Treasury is formally reviewing whether private insurers can actually absorb the losses from nation-state attacks and systemic cyber events. The Terrorism Risk Insurance Program is the model they're looking at. This matters because cyber insurance pricing, availability, and the controls insurers require are all in play. If a federal backstop emerges, it changes the entire risk transfer market. Watch this closely.

Alex: And the liability story is personal. Regulators are pursuing individual accountability after major breaches, and it is reshaping how CISOs report risk. The piece that ran this week put it bluntly — experienced practitioners are looking at the role and deciding it's not worth it. I've had this conversation privately with more than a few people this year. If you are a CISO and you haven't reviewed your D&O coverage, your indemnification agreements, and your reporting structures in light of this trend, you need to. This is not abstract. This is your personal exposure.

Jordan: Patch desk. Two urgent items. F5 BIG-IP APM, CVE-2025-53521, CVSS 9.3, active exploitation, CISA KEV, originally attributed to a nation-state actor. BIG-IP sits at your network perimeter. This is not optional. And Langflow, the AI agent framework — CVE-2026-33017, code injection, exploited within hours of disclosure, also in the KEV catalog. AI infrastructure gets patched on the same schedule as production systems, full stop.

Alex: So let's step back. What was this week? If you had to characterize it in one framing for your board — here's how I'd put it: the walls between nation-state capability and commodity threat are coming down, and they're coming down faster than anyone anticipated. DarkSword on GitHub. AI compressing exploit timelines. Former NSA directors saying the deterrence framework is weakening. These are not isolated data points. They are the same trend from three different angles.

Jordan: And the practical consequence for CISOs going into next week is that the threat model you built eighteen months ago is probably wrong in at least two or three meaningful ways. Not wrong in a "we missed something" way. Wrong in a "the underlying assumptions changed" way. That's the harder problem. It's not a patching problem. It's a strategy problem.

Alex: Three things to carry into next week. One: if you have not briefed your board on the DarkSword leak and what it means for executive device security, put it on the agenda. Two: pull your CI/CD dependency inventory and get eyes on anything in the TeamPCP blast radius. Three: have a conversation with your counsel about your personal liability exposure — not your company's, yours. The CISO accountability trend is not reversing.

Jordan: It was a heavy week. The daily show returns Monday. We'll be tracking how the TeamPCP fallout develops and watching for any attribution on the European Commission breach.

Alex: Thanks for spending part of your Saturday with us. We know your time is valuable. That's Cleartext — we'll see you Monday.


Cleartext is an automated daily podcast for CISOs and security leaders. Generated 2026-03-28.

Sources are pulled from: CyberScoop, The Record, SecurityWeek, Krebs on Security, Dark Reading, Cybersecurity Dive, BleepingComputer, Wired, Ars Technica, TechCrunch, Help Net Security, VentureBeat, Risky Business News, The Hacker News, CISA, and BankInfoSecurity.