Stryker Data Breach From Iran-Linked Handala Group
Stryker Data Breach From Iran-Linked Handala Group
As of March 17, 2026, Stryker has officially contained the cyberattack launched by the Iran-linked group Handala, though the operational damage from the data breach remains extensive. Initially, the attackers claimed to have wiped 200,000 systems. However, updated reports confirm that approximately 80,000 employee devices were affected worldwide. The attackers executed the breach by compromising Stryker’s Microsoft Intune mobile device management console. Specifically, the compromised console allowed the attackers to issue a “remote wipe” command that reset a significant portion of the company’s global fleet to factory settings. The financial recovery from this incident is expected to be massive, with experts estimating that the 80,000 wiped devices alone could cost between $24 million and $40 million.
Source: Bleeping Computer, SC Media, The Cyber Express
UK’s Companies House Confirms Security Flaw
The UK’s Companies House confirmed a security flaw in its WebFiling service. The flaw exposed personal data of five million registered companies since October 2025. The vulnerability allowed logged-in users to access other companies’ private dashboards by manipulating browser navigation, potentially revealing residential addresses, dates of birth, and email addresses. Although the agency reported no evidence of unauthorized changes yet, the flaw could have enabled fraudulent filings. The service has been patched and reported to the ICO and NCSC.
Source: Bleeping Computer
Loblaw Data Breach Impacts Customers
Canadian retail giant Loblaw notified customers of a data breach after detecting unauthorized access to a “non-critical” segment of its IT network. The breach, identified in March 2026, exposed basic personal details including names, email addresses, and phone numbers. While Loblaw confirmed that passwords and financial information remained secure, the company took the precautionary measure of force-resetting customer sessions.
Source: Security Week
Starbucks Data Breach Impacts 889 Accounts
Starbucks disclosed a data breach affecting 889 employees after unauthorized actors gained access to “Partner Central,” the company’s internal HR and benefits portal. The intrusion occurred between January 19 and February 11, 2026, from an adversary-in-the-middle phishing campaign. As a result, the campaign harvested valid login credentials via spoofed websites, compromising data such as Social Security numbers, dates of birth, and bank account information.
Source: Bleeping Computer
Telus Digital Confirms 1Petabyte Data Breach
Canadian business process outsourcing giant Telus Digital has confirmed it suffered a security incident after being claimed by ShinyHunters. The attacker, ShinyHunters, claimed to have stolen nearly 1 petabyte of data from the company in a multi-month breach. The attackers allegedly gained access via Google Cloud credentials exposed in a previous breach, later pivoting through internal systems using secrets-scanning tools. Stolen information reportedly includes call records, source code, and data from dozens of corporate clients. Telus is currently investigating with forensic experts and law enforcement, while emphasizing that business operations remain fully functional.
Source: Bleeping Computer
Click here to subscribe our Newsletter

