top of page
Untitled design.png

Weekly INK

Each week we compile an advisory on the latest threats, trends and newsworthy topics from the cyber security industry affecting small and medium enterprises. Join our subscribers below and help us prevent cybersecurity breaches.

watermark4.png

Issue #189 - March 9, 2026

  • 4 days ago
  • 2 min read

Medtech giant Stryker offline after Iran-linked wiper malware attack

Source: BleepingComputer

Iranian-backed hacktivist group Handala claimed responsibility for a devastating wiper malware attack against medical technology giant Stryker, reportedly wiping over 200,000 systems, servers, and mobile devices across offices in 79 countries. The group also claims to have stolen 50 terabytes of data before triggering the destructive wipe. Stryker confirmed the incident in an SEC filing, describing a global disruption to its Microsoft environment. Staff were instructed to immediately disconnect all company devices, and many locations reverted to pen-and-paper workflows.




CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed

Source: The Hacker News

CISA added a critical remote code execution vulnerability in the n8n workflow automation platform to its Known Exploited Vulnerabilities catalog after confirming active in-the-wild exploitation. Tracked as CVE-2025-68613 with a CVSS score of 9.9, the flaw allows authenticated attackers to inject malicious expressions that execute arbitrary code on the host system. Over 24,700 vulnerable instances remain exposed online, with federal agencies ordered to patch by March 25, 2026.




US Cyber Strategy Targets Adversaries, Critical Infrastructure, and Emerging Technologies

Source: SecurityWeek

The White House released President Trump's Cyber Strategy for America on March 6, outlining six policy pillars: shaping adversary behavior through more aggressive offensive and defensive operations; promoting regulatory reform; modernizing federal networks with zero-trust and AI-driven tools; securing critical infrastructure; sustaining US leadership in AI and quantum technologies; and building cyber talent. Released alongside an executive order targeting cybercrime and fraud, the strategy is notably brief at seven pages — the shortest national cyber strategy in over a decade — drawing both praise for its clarity and criticism for its lack of implementation detail.




ShinyHunters Targets Hundreds of Websites in New Salesforce Campaign

Source: Infosecurity Magazine

Salesforce has urged Experience Cloud customers to urgently audit their configurations after the notorious ShinyHunters group claimed to have stolen data from nearly 400 websites and approximately 100 high-profile US companies — including Snowflake, Okta, LastPass, AMD, and Salesforce itself. The group exploited overly permissive guest user profiles using a weaponized version of Mandiant's open-source AuraInspector tool to mass-scan public-facing Experience Cloud sites and extract CRM data without credentials. Salesforce confirmed the campaign is ongoing and clarified it stems from customer misconfiguration, not a platform vulnerability.




SAP Patches Critical FS-QUO and NetWeaver Vulnerabilities

Source: SecurityWeek

SAP's March 2026 Security Patch Day included fixes for two critical vulnerabilities. CVE-2019-17571 (CVSS 9.8) is a code injection flaw in the FS-QUO insurance application rooted in an outdated Apache Log4j component that could allow remote code execution. CVE-2026-27685 (CVSS 9.1) is an insecure deserialization vulnerability in NetWeaver Enterprise Portal Administration that could enable attackers to execute code, trigger denial-of-service conditions, or escalate privileges through maliciously uploaded content.




 
 

Help us Prevent Breaches.

We will never share or sell your information. Unsubscribe at any time.

Email: *

Received.

bottom of page