|
|
|
FRIDAY, MARCH 13, 2026
|
|
The Stryker attack is showing what Iranian-linked cyber capabilities can (and cannot) achieve. An international law enforcement operation took down a large botnet. And this week's podcast further breaks down the path forward for Trump's cybersecurity agenda. This is CyberScoop for Friday, March 13.
|
|
|
|
A Stryker logo on a healthcare lamp. (Getty Images)
|
|
|
What we can learn from the Stryker attack
An Iranian hacking group's claimed cyberattack on Michigan-based medical device manufacturer Stryker may mark Tehran's first significant cyber action since the U.S.-Israel conflict began, though analysts say the attack was likely opportunistic rather than targeted, with the group possibly confusing the company with Stryker military vehicles. Threat intelligence experts say Iranian cyber activity initially decreased following physical attacks on Iran but shows signs of heating up, though the nascent nature of the conflict makes it difficult to quantify patterns—with many hacktivist claims not matching reality and attacks appearing more psychological in nature to produce fear. The incident raises concerns about the defense industrial base, as Stryker has military contracts for hospital equipment and surgical supplies, with Pentagon officials emphasizing the need for real-time information sharing across the DIB and embedding cybersecurity from the start of acquisition processes rather than treating it as an afterthought. Tim Starks and DefenseScoop's Drew F. Lawrence have more.
|
|
|
CISOs, Chief AI Officers & Top Gov Leaders Talk Cybersecurity Innovation
Hear how government program executives and IT leaders are using real-time data, generative and agentic AI, search, and analytics to strengthen federal cybersecurity and support mission-critical decision making.
Register now for the 2026 Public Sector Summit in DC.
|
|
|
Another botnet bites the dust
Authorities from multiple countries dismantled SocksEscort, a residential proxy network used by cybercriminals for large-scale fraud that claimed access to about 369,000 IP addresses since 2020, compromised routers and IoT devices in 163 countries, and received roughly $5.8 million from customers who paid for anonymity. Operation Lightning seized 34 domains and 23 servers across seven countries and froze $3.5 million in cryptocurrency linked to the botnet, which exploited vulnerabilities in residential modems and used AVRecon malware to maintain consistently high victim volumes—peaking at over 15,000 daily victims in January 2025. The service, which operated since 2009 and marketed exclusively to cybercriminals, affected more than one-quarter of infected routers in the United States, with over half its 280,000 unique victims since early 2025 based in the U.S. and U.K. Matt Kapko has more.
|
|
|
|
|
What comes next for Trump's cybersecurity plan?
On this episode of Safe Mode, Greg Otto and Tim Starks look past the headline release of President Trump’s new cyber strategy and focus on what comes next: the promised follow-on guidance, the rollout of an interagency “cell” spanning DOJ, State, FBI, DoD and others that pairs cyber operations with diplomacy and arrests, and the state-by-state critical infrastructure pilot programs designed to test what actually works before scaling. In our interview segment, acting Federal CISO Mike Duffy lays out his priorities for 2026. Listen here.
|
|
|
Workday Federal Forum | Apr 28, 2026
This forum explores how transforming while modernizing can empower agencies to restore strategic capabilities to HR. Learn how to build an adaptable, resilient, and mission-ready workforce. Discover AI's role in accelerating skills-based hiring, streamlining decision-making, and enabling HR teams to prioritize strategic, human-centered work.
Register today!
|
|
|