{"id":10573,"date":"2026-03-18T10:11:38","date_gmt":"2026-03-18T07:11:38","guid":{"rendered":"https:\/\/cyberone.bg\/?p=10573"},"modified":"2026-03-18T10:11:42","modified_gmt":"2026-03-18T07:11:42","slug":"weekly-cybersecurity-report-week-11-2026","status":"publish","type":"post","link":"https:\/\/cyberone.bg\/en\/weekly-cybersecurity-report-week-11-2026","title":{"rendered":"Weekly Cybersecurity Report | Week 11, 2026"},"content":{"rendered":"\n<p>As your dedicated cybersecurity services provider,<strong>&nbsp;<a href=\"https:\/\/cyberone.bg\/\">CyberOne<\/a><\/strong>&nbsp;equips you with timely and in-depth information about current cyber attacks. Discover a weekly cybersecurity report of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Weekly Cybersecurity Report | Week 11, 2026<\/h2>\n\n\n\n<p><strong><u>Information security updates and events from the past we<\/u><\/strong><strong><u>ek<\/u><\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"1\"><a id=\"1\" href=\"#1\"><strong>1.<strong><strong>Telus Digital mega\u2011breach (Canada)<\/strong><\/strong><\/strong><\/a><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Canadian IT and services provider\u00a0<strong>Telus Digital<\/strong>\u00a0disclosed a major security incident after attackers accessed parts of its internal infrastructure.\u200b<\/li>\n\n\n\n<li>A hacker group claims theft of several hundred terabytes up to one petabyte of data, with samples suggesting exposure of multi\u2011tenant customer data, internal documents, source code, and communications; full scope is still under forensic investigation.\u200b<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"2\"><a id=\"2\" href=\"#2\"><strong>2.<strong><strong>Loblaw retail group data breach (Canada)<\/strong><\/strong><\/strong><\/a><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The same weekly incident overview reported a\u00a0<strong>data breach at Loblaw<\/strong>, Canada\u2019s largest food and pharmacy retailer, with attackers obtaining internal information and customer\u2011related data.\u200b<\/li>\n\n\n\n<li>While detailed datasets are not yet publicly enumerated, early analysis indicates exposure of personal data connected to loyalty, ecommerce, or digital services, reinforcing third\u2011party and large\u2011retail attack surface risk.\u200b<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"3\"><a id=\"3\" href=\"#3\"><strong>3.<strong><strong>Stryker med\u2011tech cyberattack (healthcare &amp; devices)<\/strong><\/strong><\/strong><\/a><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Medical\u2011technology company\u00a0<strong>Stryker<\/strong>\u00a0suffered a cyberattack that disrupted operations and required suspension of some services.\u200b<\/li>\n\n\n\n<li>Officials reported ongoing work to restore affected systems and said they currently believe core citizen\/patient personal data integrity is intact, though a group calling itself\u00a0<strong>Green Blood Group<\/strong>\u00a0claimed responsibility and access to agency\u2011level systems.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"4\"><a id=\"4\" href=\"#4\"><strong>4.<strong><strong>LexisNexis Reach2Shell exploitation<\/strong><\/strong><\/strong><\/a><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>LexisNexis<\/strong>\u00a0confirmed a data breach after hackers exploited the critical\u00a0<strong>Reach2Shell<\/strong>\u00a0vulnerability that had been public and patchable since late 2025.\u200b<\/li>\n\n\n\n<li>The company says stolen data was \u201cold, non\u2011sensitive\u201d information such as customer names, user IDs, business contact details, product\u2011usage metadata, survey IP addresses, and support tickets, and that highly sensitive identifiers like Social Security or financial data were not taken.\u200b<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"5\"><a id=\"5\" href=\"#5\"><strong>5.<strong><strong>Ransomware focus: Qilin, KillSec, Everest (South Korea)<\/strong><\/strong><\/strong><\/a><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>ASEC\u2019s\u00a0<strong>\u201cRansom &amp; Dark Web Issues \u2013 Week 2 March 2026\u201d<\/strong>\u00a0highlighted active campaigns by\u00a0<strong>Qilin, KillSec, and Everest<\/strong>\u00a0ransomware families.\u200b<\/li>\n\n\n\n<li>Recent South Korean victims include a dermatology clinic (healthcare), the local branch of a global advertising firm, an exhibition\u2011management platform, and an elevator manufacturer, illustrating how attackers are hitting healthcare, media\/marketing, SaaS platforms, and industrial manufacturing simultaneously.\u200b<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"6\"><a id=\"6\" href=\"#6\"><strong>6.<strong><strong>Cybercrime spike tied to Iran war<\/strong><\/strong><\/strong><\/a><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Akamai data showed a\u00a0<strong>245% increase in cybercrime traffic<\/strong>\u00a0(credential harvesting, scanning, automated recon) since the start of the Iran war, with banking\/fintech (40% of malicious traffic) hardest hit, followed by e\u2011commerce, gaming, tech, and media.<\/li>\n\n\n\n<li>Botnet\u2011driven discovery traffic jumped 70%, automated reconnaissance 65%, and there were notable rises in broad infrastructure scanning (52%), credential theft attempts (45%), and pre\u2011DDoS recon (38%), often routed via proxy services in Russia and China.<\/li>\n<\/ul>\n\n\n\n<p><strong><em>The cybersecurity attacks highlighted in this report aren&#8217;t just incidents, they&#8217;re blueprints of the adversary&#8217;s arsenal. To protect your business you need the right partner. CyberOne is here to help! Check out our <a href=\"https:\/\/cyberone.bg\/en\/services\">services<\/a>.<\/em><\/strong><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As your dedicated cybersecurity services provider,&nbsp;CyberOne&nbsp;equips you with timely and in-depth information about current cyber attacks. Discover a weekly cybersecurity report of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape. Weekly Cybersecurity Report | Week 11, 2026 Information security updates and events from the past week 1.Telus Digital mega\u2011breach (Canada) 2.Loblaw retail group [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":8579,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[65],"class_list":["post-10573","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-weekly-cyber-updates","tag-weekly-cybersecurity-report"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/10573","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/comments?post=10573"}],"version-history":[{"count":1,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/10573\/revisions"}],"predecessor-version":[{"id":10574,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/10573\/revisions\/10574"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media\/8579"}],"wp:attachment":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media?parent=10573"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/categories?post=10573"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/tags?post=10573"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}