TL;DR
AI Agents Are Leaking Data and Being Manipulated at Scale — A new study confirms enterprise AI agents have a governance gap wide enough to drive a threat actor through. Most organizations cannot stop their own systems from going rogue. Most are deploying anyway.
Microsoft Patches 78 Vulnerabilities Including One Found By AI — The 9.8 severity bug discovered by artificial intelligence is the detail everyone glossed over. If AI is finding critical bugs now, threat actors are running the same playbook on your infrastructure tonight.
Bug Bounty Programs Are Drowning in AI-Generated Fake Reports — The founder of cURL shut down his entire bounty program after valid submissions dropped below 5%. The vulnerability disclosure economy is broken and AI spam is the reason why.
THIS WEEK’S TOP STORY
Suspected pro-Iran hacker group tied to Stryker cyberattack…
On Wednesday, pro-Iran hacktivists hit Stryker, one of the largest medical device companies on the planet. By Thursday, CISA called it arguably the most significant cyber event tied to the Iran conflict and launched a formal investigation.
Stryker's response was professional, measured, and almost completely silent about the humans with Stryker hardware living inside their chests, spines, and joints.
Let's be precise about what Stryker actually makes. Not software. Not data. Implants. Surgical equipment. The physical infrastructure of operating rooms. When that gets hit, the damage isn't measured in leaked records.
It's measured in what happens when clinical precision gets disrupted at exactly the wrong moment.
Here's the part that should make you genuinely angry:
This was predictable.
Not in hindsight. Before. Geopolitical escalation has historically and consistently preceded retaliatory cyberattacks on Western critical infrastructure. The threat intelligence existed. The pattern was documented. The warnings were issued.
And we're still watching CISA investigate after the breach instead of defend before it — because somewhere between the intelligence report and the board meeting, preparedness lost to quarterly earnings.
The Iran conflict didn't just enter cyberspace this week.
It walked into an operating room.
So here's the only question that matters for every organization running critical infrastructure right now — not "could this happen to us?"
It's already happening.
The only question is whether you find out from your own monitoring, or from someone else's press release.
Learn more: https://www.nextgov.com/cybersecurity/2026/03/suspected-pro-iran-hacker-group-tied-stryker-cyberattack/412050/
OUR TAKE
The Stryker attack is not a Stryker story. It's an everyone story.
State-sponsored hackers didn't break into Stryker because they had a problem with Stryker. They broke in because Stryker was there, was critical, and made a point.
That's the whole lesson, and it's the one no corporate post-mortem will say plainly: if your organization touches essential services in any capacity — healthcare, utilities, logistics, finance — you are not a bystander in an escalating geopolitical cyber conflict, you are a scheduled stop on the itinerary, and the difference between companies that find out they were targeted from their own security team versus a CISA press release is exactly one thing. Whether threat intelligence was connected to board-level decision making before the breach or wheeled in like a crash cart after it. Patch your systems. Hire your analysts.
But most importantly, understand this: geopolitical risk is cyber risk now, the firewall between international conflict and your network operations center was always thinner than anyone admitted, and this week Stryker's smoking infrastructure just made that argument more convincingly than any consultant ever could.
Headlines
March 13, 2026
The Hacking Games is enabling the cybersecurity industry to hire unconventional talent to fill its labor deficit by recruiting gamers as cyber fighters
March 13, 2026
Microsoft’s March Patch Tuesday fixes 78 vulnerabilities, including Office preview pane flaws, an Excel Copilot data leak risk, and an AI-discovered 9.8 severity bug.
March 13, 2026
The controversial spying power, which allows agencies to access foreigners’ overseas communications without a warrant, will expire in April unless Congress renews it. The White House is pushing for a clean extension.
Editorial
Let me tell you exactly what happened in tech this week. The AI Toddler Stole The Car Keys… And No One Wants To Admit it!

Giphy
So here’s how it went down. A bunch of very powerful people made a bunch of very consequential decisions about artificial intelligence, wrapped them in fancy press releases that sounded reasonable…
And then went to their very expensive dinners hoping you'd be too busy arguing about something else to notice.
You almost were.
I'm here to make sure you're not.
First, Let's Acknowledge The Psychosis
We are living through the most schizophrenic moment in the history of technology.
This week alone:
Corporations are replacing human executives with AI algorithms
Those same AI systems are leaking corporate secrets like a intern on their last day
Hackers are recruiting teenagers off gaming platforms to fight cyber wars
AI is now generating so much fake security research that the people protecting the internet are drowning in machine-made nonsense
And quietly, almost politely, the U.S. government increased its digital surveillance of your life by 35%
All of this happened. In the same week.
And the official response from the people in charge?
"We're excited about the opportunities ahead."
I need you to understand something. That response isn't optimism.
That's a hostage statement.
The "AI Executive" Is Not What You Think It Is
Let's talk about the story everyone's framing wrong.
This week, the financial world announced the dawn of the virtual AI C-suite — algorithms making executive decisions once reserved for the humans who went to Wharton, played golf with the right people, and got paid $800K a year to sit in board meetings nodding at slides they didn't read.
And the tech press covered it like this was a democratization story.
"Small businesses can now access Fortune 500-level insights!"
No. Just a big fat, NO.
Let me translate what's actually happening here.
"AI Executive" means "we found a way to automate authority without automating accountability."
That's it. That's the whole product.
Because here's what the press release doesn't say: when a human CFO blows up the company finances with a terrible strategic call, there's a process. There's a board meeting. There are consequences. Someone clears out a desk.
When an AI CFO blows up the company finances?
"We are reviewing our AI governance framework and remain committed to responsible deployment."
Nobody gets fired. Nobody gets sued. Nobody has to look a single employee in the eye.
The algorithm doesn't have eyes.
That's not a feature. That's the entire business model.
Companies aren't replacing human executives because AI is smarter. They're replacing human executives because AI is cheaper, quieter, and you can't subpoena it.
The AI isn't disrupting corporate leadership.
It's giving corporate leadership the perfect escape hatch from corporate leadership.
Your New Digital Assistant Is Also Your New Security Nightmare
Now here's where it gets genuinely funny in a way that should make you deeply, existentially uncomfortable.
The same week corporations are rushing to hand executive authority to AI systems, security researchers published findings confirming what anyone paying attention already suspected:
Those AI systems can be manipulated into leaking your most sensitive corporate data. Easily. By design.
Let that land for a second.
Companies are simultaneously:
Giving AI systems more decision-making authority than most mid-level managers
Discovering those systems have the data security of a Post-it note on a park bench
This is the corporate equivalent of handing someone your house keys, your bank passwords, and your deepest secrets — and then being shocked when you find out the lock was made of cardboard.
The consultants sold you the future.
Nobody mentioned the future came with an unlocked back door.
And before you say "well they'll fix the security issues" — understand that this is not a bug being chased by a patch. This is the fundamental nature of systems trained to be helpful, deployed in environments built to be efficient, inside organizations incentivized to move fast.
The vulnerability isn't in the code.
The vulnerability is in the decision to deploy before understanding.
And that decision gets made fresh every single morning by someone who read a McKinsey report on the flight here.
ON THE BRIGHT SIDE… We Told Kids Gaming Was Worthless. Now We Need Them To Save The Internet.
Okay. I need a moment of genuine appreciation before I get back to the alarm bells.
This week, cybersecurity firms announced they are actively recruiting Gen Z gamers as the next generation of cyber defenders.
And I know that sounds like a quirky sidebar. A fun little "times have changed!" moment.
But I need you to understand the actual scale of what's being described here.
The global cybersecurity workforce shortage is 3.4 million people.
Three. Point. Four. Million.
That's not a talent gap. That's a talent canyon. That's a missing workforce the size of a mid-sized country.
And the industry's answer — the official, serious, industry-wide answer — is to go find teenagers on Twitch and Discord and convince them that the skills they built destroying opponents in Call of Duty ranked mode at 2am are actually nationally critical infrastructure competencies.
Which, to be clear, they are.
The adversarial thinking. The pattern recognition. The obsessive iteration. The willingness to stay in a problem for eight hours because losing is personally unacceptable.
These are exactly the psychological traits cyber defense needs and traditional computer science education was never designed to produce.
So yes — the industry that kept telling your kids to put down the controller?
It is now knocking on their door asking for help.
Every parent who confiscated a gaming PC during exam week owes a formal, written apology.
But here's the uncomfortable follow-up question nobody wants to ask at the recruitment fair:
We're pulling teenagers into a workforce defending infrastructure against adversaries that include nation-state hackers, organized crime, and AI-assisted attacks — and we're doing it because we ran out of options.
That's not a pipeline success story.
That's a draft.
Other News From Around The Web
1) FBI FISA 702 Queries on Americans Rose 35% in 2025 — The surveillance authority designed for foreign targets was used to query Americans' data 35% more frequently last year than the year before. It expires in April. The White House wants a clean extension with no additional oversight or reform. This story deserves more oxygen than it is currently getting.
2) WordPress Plugin Flaw Puts 400,000 Websites at Risk — A security vulnerability in the Ally WordPress plugin allows unauthenticated attackers to extract sensitive data from affected sites. With over 400,000 active installations, the exposure surface is significant. If you manage WordPress environments, this one needs to move up the priority list.
3) Mastercard Launches AI C-Suite for Small Businesses — The payments giant announced a Virtual CFO this week, with a Virtual CMO and Virtual CSO to follow, pitched as democratizing executive-level insight for SMEs. It is worth noting that the intelligence powering these AI executives is drawn from billions of Mastercard transactions. The product is genuinely useful. The data arrangement is worth understanding before signing up.
4) The Hacking Games Recruits Gen Z Gamers as Cyber Talent — A recruitment platform is using AI to identify gamers whose skills translate directly to cybersecurity roles, building what they're calling a generation of cyber fighters. The talent pipeline the industry desperately needs may have been sitting in a gaming chair this whole time.
5) Framework Raises RAM Prices for the Third Time — Framework, the modular laptop company, raised RAM prices again this week and openly advised customers to consider buying third-party components instead. The culprit is AI-driven memory demand creating component scarcity across the board. Dell executives confirmed this week that AI infrastructure has created what they called "almost infinite demand" for memory components. Your hardware budget and an AI data center are now in direct competition.
6) Adobe CEO Steps Down After 18 Years — Shantanu Narayen is stepping down as Adobe CEO after 18 years, remaining as board chair while a successor is identified. Adobe faces a genuinely complex transition: a failed $1 billion Figma acquisition, a stock under pressure, and an AI creative revolution rewriting the rules of its core market. The next CEO inherits both a legacy and an existential question about what Adobe is in an AI-native world.
7) ECHO: The Social Network That Predated Everything — A quiet but fascinating piece of cyber history surfaced this week — the story of East Coast Hang Out, or ECHO, widely regarded as the first social network, launched in 1989 by Stacy Horn. Before Twitter, before Facebook, before MySpace, there was a dial-up community in New York that figured out online social connection first. Worth reading for context on how long humans have been trying to build community online — and how much has changed, and how little.
The Bottom Line
The Story You Scrolled Past That Actually Matters Most
I'm going to say something that will probably get less engagement than everything above it.
And I'm going to say it anyway, because this is my publication and I answer to you, not to the algorithm.
Government surveillance of your digital life increased 35% in 2025.
FISA — the legal authority that governs how intelligence agencies can query data collected on Americans — is up for renewal.
There is no viral moment here. No funny screenshot. No absurd executive announcement with a great pull quote.
Just a number — 35% — and a quiet legislative process that most people will never follow, attached to a legal authority most people have never read, producing consequences that won't be visible until the day they suddenly, completely, and permanently are.
Here is what I need you to understand about how this fits into everything else we've discussed this week:
AI is becoming infrastructure. Infrastructure for business decisions. Infrastructure for financial systems. Infrastructure for security. Infrastructure for the economy.
And simultaneously — in the same ecosystem, in the same moment — the government is expanding its ability to surveil that infrastructure.
These are not separate stories.
This is one story.
The story of who controls the most powerful technological systems in human history, and who gets to watch everyone who uses them.
And right now the answer to both questions is: not you.




