Data Breaches

When Your Security Tools Become the Attack Vector: This Week's Supply Chain Wake-Up Call

When Your Security Tools Become the Attack Vector: This Week’s Supply Chain Wake-Up Call

You know that sinking feeling when you realize the tools meant to protect you might be working against you? This week delivered a particularly sobering reminder of just how fragile our security infrastructure can be, with attackers successfully compromising antivirus update servers and finding creative new ways to abuse legitimate platforms.

The eScan Breach: When Protection Becomes Infection

The biggest story this week has to be the compromise of eScan’s update infrastructure. Unknown attackers managed to hijack the legitimate update mechanism for this Indian antivirus solution, pushing multi-stage malware directly to enterprise and consumer systems that thought they were getting security patches.

When Default Passwords Meet Nation-States: Why February's Security Wake-Up Calls Hit Different

When Default Passwords Meet Nation-States: Why February’s Security Wake-Up Calls Hit Different

I’ve been staring at this week’s security news, and honestly, it feels like we’re watching several different movies play out simultaneously – and none of them have happy endings. From AI tools quietly shipping code to China to nation-state actors exploiting the most basic security failures, February 2nd delivered a reality check that’s worth unpacking.

The Poland Attack: When Basic Security Hygiene Becomes a National Security Issue

Let’s start with what should be the most shocking story, but somehow isn’t anymore. Poland’s CERT released details about attackers hitting their energy infrastructure using – wait for it – default credentials on industrial control systems.

Supply Chain Attacks Hit Developer Tools Hard: What the Notepad++ and VSCode Incidents Tell Us

Supply Chain Attacks Hit Developer Tools Hard: What the Notepad++ and VSCode Incidents Tell Us

If you thought supply chain attacks were just about big enterprise software, this week’s news should change your mind. We’re seeing attackers go after the everyday tools developers use – and they’re getting frighteningly good at it.

The most concerning story comes from the Notepad++ compromise, where Chinese state-sponsored hackers managed to hijack the popular code editor’s update mechanism for six months. Six months! That’s not a quick hit-and-run – that’s a sustained, strategic operation targeting one of the most trusted tools in a developer’s toolkit.

Supply Chain Attacks Are Getting Personal: What This Week's Incidents Tell Us About Our Blind Spots

Supply Chain Attacks Are Getting Personal: What This Week’s Incidents Tell Us About Our Blind Spots

I’ve been tracking several concerning incidents from this week that paint a pretty clear picture of where attackers are focusing their efforts in 2026. What’s particularly striking is how these campaigns are targeting the tools we trust most – from our development environments to our file sharing services – while simultaneously getting more aggressive in their extortion tactics.

Law Enforcement Strikes Back While Tech Giants Juggle Trust and Security

Law Enforcement Strikes Back While Tech Giants Juggle Trust and Security

It’s been quite a week for security news, and I wanted to share some thoughts on what’s been happening. We’re seeing some significant wins against cybercriminals alongside some concerning developments in the tech world that affect how we think about data protection and user trust.

The FBI’s Double Win Against Cybercrime

Let’s start with the good news – law enforcement had a really productive week. The FBI managed to seize the RAMP cybercrime forum, which was one of the last major platforms openly advertising ransomware services. What makes this particularly significant is that RAMP was filling the void left by other shuttered forums, becoming a go-to marketplace for malware and hacking tools.

When Gaming Mods Meet Corporate Networks: Why Your Security Perimeter Just Got More Complicated

When Gaming Mods Meet Corporate Networks: Why Your Security Perimeter Just Got More Complicated

You know that feeling when you think you’ve got your security boundaries figured out, and then reality comes along to remind you otherwise? That’s exactly what happened this week as we watched everything from Chinese APT groups upgrading their toolkits to kids’ gaming mods becoming corporate security nightmares.

Let me walk you through what caught my attention in the security world lately, because some of these developments are going to change how we think about protecting our organizations.

MongoDB Attacks and Million-Device Botnets: Why Basic Security Still Matters Most

MongoDB Attacks and Million-Device Botnets: Why Basic Security Still Matters Most

I’ve been watching the security news this week, and honestly, it feels like we’re stuck in a time loop. While everyone’s talking about AI threats and nation-state actors, cybercriminals are still making bank from the same fundamental mistakes we’ve been warning about for years.

The MongoDB Problem That Won’t Go Away

Let’s start with something that should be ancient history by now: exposed MongoDB instances getting hit by extortion attacks. I know, I know – we’ve been talking about securing database deployments since MongoDB first hit the scene. But here we are in 2026, and threat actors are still running automated scripts to find unsecured instances, steal the data, wipe the databases, and demand relatively small ransoms for restoration.

When Cloud Backups Become Attack Vectors: The Marquis-SonicWall Connection Shows Why Third-Party Risk Matters More Than Ever

When Cloud Backups Become Attack Vectors: The Marquis-SonicWall Connection Shows Why Third-Party Risk Matters More Than Ever

We’ve all been there – explaining to management why we need to audit every single vendor in our supply chain. Well, the recent Marquis Software Solutions incident gives us a perfect case study for why those conversations matter so much.

The Domino Effect That Hit Dozens of Financial Institutions

Here’s what happened: Marquis Software Solutions, a Texas-based financial services provider, suffered a ransomware attack in August 2025 that rippled through dozens of U.S. banks and credit unions. But here’s the kicker – Marquis is pointing the finger at a SonicWall cloud backup breach that wasn’t even disclosed until a month after their attack.

When Nation-States Hit Wind Farms and Google Engineers Go Rogue: This Week's Security Reality Check

When Nation-States Hit Wind Farms and Google Engineers Go Rogue: This Week’s Security Reality Check

The past few days have served up a particularly sobering reminder that cyber threats don’t take weekends off. While we were dealing with the usual phishing campaigns and patch cycles, some significantly more concerning events were unfolding that deserve our attention.

Poland’s Energy Grid Under Coordinated Attack

Let’s start with what might be the most significant story: CERT Polska revealed that coordinated cyber attacks hit over 30 wind and solar farms on December 29, 2025. This wasn’t some script kiddie testing their skills – we’re talking about a systematic campaign that also targeted a manufacturing company and a combined heat and power plant serving nearly half a million customers.

When Nation-States and Cybercriminals Hit Critical Infrastructure: This Week's Wake-Up Calls

When Nation-States and Cybercriminals Hit Critical Infrastructure: This Week’s Wake-Up Calls

I’ve been tracking several concerning developments this week that really highlight how our threat environment keeps evolving. From insider threats at tech giants to sophisticated vishing campaigns and critical infrastructure attacks, there’s a lot to unpack here.

The Google AI Theft Case: When Insiders Go Rogue

The conviction of Linwei Ding, the former Google engineer who stole AI supercomputer data and shared it with Chinese tech firms, is a stark reminder that our biggest threats often come from within. U.S. convicts ex-Google engineer for sending AI tech data to China