Close Menu
  • Home
  • Cyber security
    • Cybersecurity Tools
    • Mobile security
    • Computer Security
    • Malware
  • Cyber news
    • Data breaches
  • Review
  • Top10
  • Cyber Insurance
  • Cyber law & Compliance
  • About us
  • Cyberinfos
X (Twitter) LinkedIn WhatsApp
Trending
  • Cybersecurity Weekly Report: 16 – 22 March, 2026
  • CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE
  • WhiteHat Hub VBA Macros Workshop 2026 – Learn Macro Malware Analysis
  • Betterleaks Secrets Scanner: Fixing API Key Leak Detection Gaps
  • Cybersecurity Weekly Report: March 9 -15, 2026
  • AI-Powered Penetration Testing Tool: PentAGI Explained
  • Metasploit Pro 5.0.0 Released: New Exploits, AD CS Attacks & Tools
  • CrackArmor AppArmor Vulnerability Exposes 12M Linux Systems
Sunday, March 22
Cyber infos
X (Twitter) LinkedIn WhatsApp
  • Home
  • Cyber security
    • Cybersecurity Tools
    • Mobile security
    • Computer Security
    • Malware
  • Cyber news
    • Data breaches
  • Review
  • Top10
  • Cyber Insurance
  • Cyber law & Compliance
  • About us
  • Cyberinfos
Cyber infos
Weekly cybersecurity report

Cybersecurity Weekly Report: 16 – 22 March, 2026

V DiwaharBy V DiwaharMarch 22, 2026No Comments14 Mins Read
Facebook Twitter Pinterest LinkedIn WhatsApp Copy Link
Share
Facebook Twitter Pinterest Threads Copy Link

In 20 hours, attackers turned a newly disclosed flaw into a working exploit. That wasn’t the exception this week it was the pattern.

This cybersecurity weekly report tracks how multiple incidents from Stryker’s identity-driven wipe to Trivy’s CI/CD supply chain compromise exposed the same underlying failure: defenders are losing control of trust layers they rely on every day. You’ve patched systems, hardened endpoints, and locked down access. It still wasn’t enough. Because the attack surface shifted.

A single compromised admin credential, a poisoned version tag, or an exposed edge device now leads directly to operational disruption across healthcare, finance, and critical infrastructure  where downtime translates into immediate financial and reputational damage. This week alone saw 1PB of data exposed and a CVSS 10.0 zero-day exploited before disclosure.

This report breaks down the real attack paths, the vulnerabilities already under active exploitation, and the tactical shifts redefining ransomware trends and supply chain attacks, so you can see where defenses are actually failing, and what needs to change next.

Infographic showing cybersecurity weekly report statistics including data breaches and zero-day exploits

Table of Contents hide
1 Major Incidents of this Cybersecurity Weekly Report
2 New Vulnerabilities & Patches
3 Ransomware Activity
4 Threat Intelligence
5 Industry News
6 Tool Updates
7 Final Thoughts

Major Incidents of this Cybersecurity Weekly Report

Stryker Corporation – Healthcare / Medical Technology

Week two, and Stryker still wasn’t stable. The company, a major supplier of surgical equipment, orthopedic implants, and neurotechnology, disclosed a cyberattack on March 11 that continued to disrupt operations globally.

Handala also known as Void Manticore and Storm-0842, with links to Iran’s Ministry of Intelligence and Security claimed it wiped over 200,000 devices across 79 countries and exfiltrated 50TB of data. That scale sounds extreme. Even partially true, it suggests deep administrative access.

Stryker said the incident was limited to its Microsoft Windows environment, with no malware or ransomware found. That detail stood out. Researchers at Palo Alto Networks and Optiv believe attackers likely misused Microsoft Intune admin credentials, possibly sourced from infostealer logs, to remotely wipe devices using legitimate tools.

Operations took a hit. Ordering, manufacturing, and shipping systems struggled through March 22, while CISA and the FBI engaged directly. One credential was enough. Now the question is how many others are exposed.

Trivy-Open Source Scanner – Developer Security / CI/CD Supply Chain

Another breach, same weak point. Aqua Security’s Trivy open-source scanner was hit again, this time through its CI/CD integration layer.

Attackers force-pushed 75 of 76 version tags in the aquasecurity/trivy-action GitHub repository, which powers Trivy scans inside GitHub Actions pipelines. That move replaced trusted version references with malicious code. Quietly.

Each poisoned tag executed inside GitHub Actions runners, allowing attackers to extract API keys, tokens, and other credentials exposed during builds. No exploit required. Just automation doing its job.

Socket researcher Philipp Burckhardt linked the activity to a persistent attacker abusing version tags as a covert infostealer delivery channel embedded directly into developer workflows.

The exposure comes down to one habit. Teams that pinned Trivy to version tags instead of immutable commit hashes may have unknowingly executed attacker-controlled code.

Aqua Security acknowledged the issue and urged immediate audits of pipeline configurations. One shortcut caused this. Now every CI/CD pipeline using mutable tags needs a second look.

Telus Digital – Business Process Outsourcing / Technology Services

The numbers alone tell the story. TELUS Digital, a Canada-based BPO serving sectors from banking to healthcare, confirmed on March 11 that the ShinyHunterz ransomware group had breached its systems.

What surfaced was staggering. Around 1 petabyte of customer data including source code, FBI background checks, financial records, voice recordings, and Salesforce data was exposed, tying multiple industries to a single incident. That kind of concentration changes the stakes.

ShinyHunterz didn’t pick randomly. BPO providers like TELUS Digital aggregate sensitive data from dozens of companies, which means one intrusion can ripple outward fast, affecting organizations that never directly interacted with the attacker.

Recovery stretched through March 16–22, with teams still working to determine the full scope. That delay matters.

Berkaida – Financial Services / Commercial Real Estate

It showed up quietly. On March 20, 2026, ShinyHunters added Berkadia a commercial real estate finance firm handling mortgage banking, investment sales, and loan servicing to its growing list of victims.

There’s very little confirmed. No disclosed ransom demand, no verified data volume, and no public statement from Berkadia at the time of writing just a listing from a group known for turning stolen data into leverage. That silence stands out.

ShinyHunters typically operates on exposure, not encryption alone, using stolen datasets to pressure victims and extract payment. If Berkadia follows that pattern, the real issue isn’t system downtime it’s what data may already be in чуж hands and how it might be used.

Analyst Insight

The pattern is getting harder to dismiss. This week’s incidents all trace back to one entry point identity.

At Stryker, attackers likely used infostealer-derived credentials tied to Microsoft Intune. The Trivy breach flipped CI/CD tokens into an access mechanism, quietly embedding malicious code into trusted pipelines. TELUS Digital follows the same arc, where credential abuse appears to have enabled large-scale data access.

Healthcare systems disrupted due to identity-based cyberattack and device wipe

Different targets. Same failure point. This isn’t about firewalls or exposed services. It’s what happens after login when attacker-controlled credentials are accepted as legitimate inside admin consoles and orchestration systems.

That’s where things break. Platforms like Intune, WSUS, and CI/CD tooling assume trusted operators. Once those credentials are compromised, attackers don’t need exploits they inherit control.

That changes the risk model. Admin credential hygiene rotation, isolation, monitoring is no longer optional. It’s operational. Because when identity is compromised, the perimeter doesn’t matter anymore.

New Vulnerabilities & Patches

[CVE] CVE-2026-20131 | Cisco | Secure Firewall Management Center (FMC) / Security Cloud Control | CVSS: 10.0 | Exploited: Yes

Timeline of zero-day vulnerability from discovery to patch releaseThis one’s already been in play. Cisco FMC’s web interface improperly deserializes untrusted Java byte streams, allowing an unauthenticated remote attacker to execute arbitrary code as root no login, no user interaction, just direct access if the interface is reachable. That’s as bad as it gets.

Amazon Threat Intelligence tracked Interlock ransomware operators exploiting this as a zero-day starting January 26, 2026, well before public disclosure. CISA added it to the KEV catalog on March 19, with federal remediation required by March 22. Patches are out, but any internet-exposed FMC instance remains a high-risk entry point.

[CVE] CVE-2026-33017 | Langflow | Langflow AI Platform | CVSS: 9.3 | Exploited: Yes
The flaw is almost blunt in its design. The /api/v1/build_public_tmp/{flow_id}/flow endpoint accepts attacker-controlled Python code and passes it straight into exec() no sandbox, no filtering, no guardrails. One request is enough.

Sysdig observed exploitation attempts within 20 hours of disclosure, even before a public proof-of-concept circulated. Attackers quickly moved to extract API keys for OpenAI, Anthropic, AWS, and connected databases — exactly where the value sits in AI pipelines.

Patch to version 1.9.0 or later immediately, lock down the exposed endpoint, and disable auto-login in production.

[CVE] CVE-2026-21992 | Oracle | Identity Manager / Web Services Manager | CVSS: 9.8 | Exploited: No (not yet confirmed)
Oracle’s out-of-cycle alert covers two Fusion Middleware issues, both remotely exploitable without authentication. CVE-2026-21992 allows full compromise of Oracle Identity Manager and Web Services Manager over HTTP.

No confirmed exploitation yet. That window won’t stay open long. Identity infrastructure is a high-value target, and flaws like this tend to move quickly once patch details circulate. Oracle is pushing for immediate updates.

[CVE] CVE-2026-21385 | Qualcomm / Google | Android (Qualcomm GPU components) | CVSS: Critical | Exploited: Yes
This zero-day was already active before Google’s March 2026 Android update part of a massive 129-CVE release, the largest in Android’s history.

It’s hardware-level exposure. The issue sits in Qualcomm GPU drivers, affecting most flagship Android devices. Until the March 5 security patch is applied, those devices remain exposed to in-the-wild exploitation.

Patch Tuesday – Microsoft, March 2026

Eighty-four CVEs this month. Eight critical. Among them, CVE-2026-26144 stands out an Excel information disclosure flaw that enables Copilot Agent data exfiltration without user interaction. Office bugs CVE-2026-26110 and CVE-2026-26113 allow remote code execution via the Preview Pane, while CVE-2026-26114 targets SharePoint.

No active exploitation reported at release. Still, these are the kinds of bugs that age badly if left unpatched. Microsoft also expanded hotpatching for Azure VM images, allowing updates without reboot useful, if actually used.

Atlassian – March 17, 2026

Atlassian’s monthly bulletin spans multiple products, including Confluence, Jira, and Bitbucket. Routine on paper.In practice, these platforms sit at the center of development and collaboration workflows, which makes delayed patching a recurring and avoidable risk.

Ransomware Activity

Interlock – Edge Device Exploitation at Scale

This is where things escalated. Interlock ransomware operators emerged as the most operationally significant threat this week, not because of volume, but because of how they got in. They didn’t wait for disclosure.

Amazon Threat Intelligence confirmed the group had been exploiting CVE-2026-20131 in Cisco FMC as a zero-day since January 26, 2026, quietly establishing access across education, engineering, construction, manufacturing, healthcare, and government environments sectors where downtime isn’t tolerated and pressure to pay builds fast.

That access wasn’t accidental. Using a CVSS 10.0 flaw months before a patch existed points to something deeper either access to pre-disclosure vulnerability intelligence or a supply chain of exploits that’s no longer limited to state-backed actors. That line is starting to blur.

ShinyHunters / ShinyHunterz – Multi-Sector Data Extortion

The activity didn’t slow elsewhere. ShinyHunters and its closely aligned variants, including ShinyHunterz, continued expanding a data-extortion-first model that favors exposure over encryption.

TELUS Digital and Berkadia both surfaced as victims this week.

No ransom demands were disclosed, which fits the pattern. These operations increasingly rely on controlled leaks, selective disclosure, and reputational pressure rather than immediate system disruption a quieter approach, but often just as effective. It’s less noise. More leverage.

Notable Leak Site Listings – March 20, 2026

The volume stayed steady. Multiple ransomware groups added fresh victims to leak sites, cutting across sectors and regions:

  • Qilin: Accolend (lending); Enviaseo (government, Colombia)
  • Akira: Angus-Young Group; Career Adventures
  • DragonForce: HMS Group (engineering services, Australia); JustMercedes (automotive)
  • INC_RANSOM: Namibia Airports Company
  • Nitrogen: Enensys Technologies (broadcast technology, France)

That’s the point. The spread across industries and geographies reinforces a reality most organizations already know but rarely act on targeting is opportunistic, and exposure often comes down to who’s reachable, not who’s strategic.

DragonForce’s activity in Australian infrastructure adds another layer, especially given already elevated threat conditions in the region.

Tactical Shifts

The playbook is tightening. Double extortion still dominates, but the entry points are shifting away from phishing and toward infrastructure-level access MDM platforms, edge devices, and management interfaces that offer immediate control once breached.

Faster in. Faster impact. That compression matters. When attackers land directly inside administrative systems, the gap between initial access and operational disruption shrinks to hours, not days.

And by then, response teams are already behind. And in this sector, that matters.

Commercial real estate finance involves sensitive deal structures, borrower financials, and institutional investment data the kind of information that doesn’t need to be massive in volume to be damaging.

Threat Intelligence

Handala / Void Manticore (Iran-MOIS) – Critical Infrastructure, Healthcare, Western Corporates

Attribution firmed up this week. Handala also tracked as Storm-0842, Dune, Red Sandstorm, and Banished Kitten continues to operate as a “faketivist” front for Iran’s Ministry of Intelligence and Security, with confirmation from Check Point and IBM X-Force backing that assessment.

The shift in technique stands out. Push Security’s analysis shows the group likely moved away from its usual playbook VPN brute-force and wiper deployment and instead leaned on aged infostealer credentials to gain access. That’s a quieter entry point, and one that slips past controls tuned for noisier behavior.

Less effort. More access.

[TTP] Valid Accounts – Infostealer Credentials (T1078)
[TTP] Remote Services – Intune MDM Abuse (T1021)
[TTP] Data Destruction – Mass Device Reset (T1485)

Operation GhostMail – Russian State-Sponsored, Ukraine-Focused

This one relied on trust. Operation GhostMail targeted Ukraine’s State Hydrographic Service using CVE-2025-66376 in Zimbra, injecting obfuscated JavaScript into HTML emails sent from a compromised institutional account.

No obvious red flags. Victims who opened those emails exposed credentials, session tokens, 2FA backup codes, browser passwords, and months of mailbox data all quietly exfiltrated over DNS and HTTPS channels.

The campaign dates back to January 22, 2026, and has since pushed CISA to add the vulnerability to KEV.

[TTP] Spearphishing via trusted sender (T1566.001)
[TTP] Session/token harvesting (T1539)

Speagle Malware – Cyber Espionage / Financial Sector

This one hides in plain sight. Speagle, a newly observed infostealer, hijacks Cobra DocGuard infrastructure  a legitimate document security platform to exfiltrate sensitive data while blending in with normal client-server traffic.

Detection becomes guesswork. Symantec and Carbon Black note the technique mirrors earlier abuse of the same platform in 2022, suggesting attackers are revisiting trusted software channels because they still work. And for defenders, that’s the problem.

Industry News

CISA Kev Catalog – Multiple Additions, March 16–20, 2026

Seven vulnerabilities were added in just days, including Cisco FMC’s CVSS 10.0 flaw, Apple WebKit-related issues, Chromium V8 bugs, Zimbra, and SharePoint deserialization RCE. Deadlines were tight.

Federal agencies had until March 22 for Cisco FMC and March 23 for SharePoint timelines that leave little room for delay, especially when exploitation is already confirmed.

CISA also pushed guidance around endpoint and MDM hardening following the Stryker incident.

XBow –  $120 Million Series C Funding

Money is flowing toward automation. Xbow raised $120 million this week, betting that AI-driven penetration testing can keep pace with attackers who are already automating their own workflows.

That shift is telling. CEO Oege de Moor framed it plainly  manual testing cycles can’t keep up with how fast attack surfaces are expanding.

Apple –  WebKit Vulnerability Patched (March 2026)

Apple pushed fixes for a WebKit flaw enabling same-origin policy bypass across iOS and macOS. It sounds niche.

In practice, these bugs often sit early in exploit chains, giving attackers a foothold inside the browser before escalating further. CISA also flagged a related Apple buffer overflow in KEV this week.

FDA – GE Healthcare Centricity Medical Imaging Recall

This one crosses into patient safety. The FDA issued a recall for GE Healthcare Centricity imaging systems due to a vulnerability that could allow data manipulation or disrupt system availability. Not theoretical.

It lines up with broader concerns about connected medical devices and recent policy moves pushing for audits of foreign-manufactured systems in critical environments.

Tool Updates

TRIVY –  Supply Chain Security Warning

After the March 20 compromise of Trivy’s GitHub Actions repositories, the guidance is direct: pin to commit hashes, audit pipeline activity, and rotate any exposed secrets.

Assume exposure. Version tags can’t be trusted if they can be rewritten and in this case, they were.

Microsoft – Azure VM Hotpatching (Generally Available)

Microsoft expanded hotpatching for Azure VMs, allowing security updates without rebooting supported Windows Server systems. Useful, if adopted.

It removes one of the most common excuses for delayed patching in production environments.

Nuclei Templates –  CVE-2026-33017

Templates for the Langflow RCE appeared within hours of disclosure. No surprise there.

Even without official inclusion, community tooling is already scanning for exposed instances which means unpatched systems are likely being probed right now.

Atlassian – March Security Bulletin

Atlassian updated fixes across Confluence, Jira, and Bitbucket. Routine update.

But these platforms sit at the center of development workflows, which makes delayed patching a recurring and preventable risk.

Final Thoughts

This week didn’t just highlight threats it exposed how fragile trust has become. This cybersecurity weekly report shows attackers moving faster, thinking smarter, and targeting what organizations still assume is safe.

Identity. CI/CD. Edge systems. That’s where breaches start now.

If you’re still prioritizing perimeter defenses over credential control and tool integrity, you’re already behind. The next attack won’t look louder it’ll look legitimate. And that’s the danger.

👉 Want to stay ahead of evolving threats like these? Follow our weekly reports and get real-world insights before attackers turn them into your next incident.

⚠️ Disclaimer: This report is compiled from publicly available threat intelligence sources for educational and awareness purposes. IOCs and CVE details should be independently verified against CISA KEV, NVD, and vendor advisories before operational use.

Related posts:

  1. Cyber Security Weekly Threat Mitigation & Vulnerability Round-Up
  2. Cybersecurity Newsletter Weekly – October 6 -12, 2025
  3. Cybersecurity Weekly Report: Multiple Security Breakdowns Close Out 2025
  4. Cybersecurity Weekly Report: Breaches, Ransomware & CVEs (Jan 11–17, 2026)
Share. Facebook Twitter Pinterest Threads Telegram Email LinkedIn WhatsApp Copy Link
Previous ArticleCVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE
V Diwahar
  • Website
  • LinkedIn

I'm SOC Analyst and independent Cybersecurity researcher, founder of CyberInfos.in. I analyzes cyber threats, vulnerabilities, and attacks, providing practical security insights for organizations and cybersecurity professionals worldwide.

Related Posts

Cybersecurity Weekly Report: March 9 -15, 2026

March 16, 2026
Read More

Cybersecurity Weekly Report: Jan 18-24 Threats

January 26, 2026
Read More

Cybersecurity Weekly Report: Breaches, Ransomware & CVEs (Jan 11–17, 2026)

January 19, 2026
Read More
Add A Comment
Leave A Reply Cancel Reply

Cyber News

Over 100 VS Code Extensions Exposed: Major Security Risks Threaten Developers Worldwide

October 16, 2025

Android Users Warned: New Sturnus Malware Can Read Your Chats & Empty Your Bank

November 24, 2025

Beware of Fake Meta Emails: Phishing Campaign Targeting Ad Accounts

March 24, 2025

SmarterMail Vulnerabilities Actively Exploited in Ransomware Attacks

February 19, 2026

3,280,081 Fortinet Devices Online With Exposed Web Properties Under Risk

January 30, 2026

Top 10

Top 10 Cybersecurity Resolutions Every User Should Make in 2026

January 1, 2026

Top 10 Best Autonomous Endpoint Management Tools in 2026

November 14, 2025

Top 10 Best API Security Testing Tools in 2026

October 29, 2025

10 Best Free Malware Analysis Tools–2026

July 1, 2025

Top 10 Best Dynamic Malware Analysis Tools in 2026

March 6, 2025

Mobile Security

Android Security Update Fixes 129 Flaws, Zero-Day

March 3, 2026

PromptSpy Android Malware Marks First Use of Generative AI in Mobile Attacks

February 20, 2026

Google Is Finally Letting Users Change Gmail Address – Here’s How It Works

December 26, 2025

Securing Mobile Payments and Digital Wallets: Tips for Safe Transactions

December 19, 2025

How to Prevent SIM Swap Attacks and Protect Your Mobile Number in 2026

December 16, 2025
Cyber Insurance

A Step-by-Step Checklist to Prepare Your Business for Cyber Insurance (2026 Guide)

December 14, 2025

Is Your Business Really Protected? A Deep Dive Into Cyber Liability Coverage

December 6, 2025

What Cyber Insurance Doesn’t Cover & How to Fix the Gaps

December 1, 2025

Top Cyber Risks Today and How Cyber Insurance Protects You in 2026

November 28, 2025

What Every Business Owner Must Know Before Buying Cyber Insurance in 2026

November 26, 2025
Recents

Cybersecurity Weekly Report: 16 – 22 March, 2026

March 22, 2026

CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE

March 20, 2026

WhiteHat Hub VBA Macros Workshop 2026 – Learn Macro Malware Analysis

March 17, 2026

Betterleaks Secrets Scanner: Fixing API Key Leak Detection Gaps

March 17, 2026

Cybersecurity Weekly Report: March 9 -15, 2026

March 16, 2026
Pages
  • About us
  • Contact us
  • Cyberinfos
  • Disclaimer
  • Privacy policy
  • Sitemaps
  • Terms and conditions
About us

CyberInfos delivers trusted cybersecurity news, expert threat analysis, and digital safety guidance for individuals and businesses worldwide.

LinkedIn
Partners
White Hat Hub Partner
X (Twitter) LinkedIn WhatsApp
  • Contact us
  • Sitemap
© 2026 Cyberinfos - All Rights are Reserved

Type above and press Enter to search. Press Esc to cancel.