The Iranian Cyber Threat Isn’t Slowing Down. 200,000+ Devices Wiped in 3 Hours.
On March 11, 2026, Handala used a compromised Microsoft Intune admin account to wipe 200,000+ devices at Stryker without deploying malware. That was one campaign. Iranian threat actors are also targeting cloud infrastructure, identity systems, VPNs, IP cameras, and critical sectors across the U.S. and beyond. This briefing covers the full threat picture, what is active right now, what is being targeted, and what your team needs to do before it becomes your problem.
Inside the Briefing
-
How Handala wiped 200,000+ Stryker devices without deploying malware, and what that means for any organization using endpoint management tools.
-
The full roster of active Iranian threat actor groups, their targets, and live campaign activity.
-
The infrastructure now being exploited across sectors, including MDM, cloud, VPN, and identity systems.
-
How to identify whether your environment matches the exposure profile attackers are actively hunting.
-
Immediate actions to detect, validate, and reduce risk, prioritized by what is being exploited right now.
-
Live HivePro technical session: which Iranian attacks are surfacing and how to detect and prioritize them in your environment.
