Skip to content
Get weekly news collection

Latest Security News Collection

Security news collection - current edition

#DataBreach #CyberSecurity #TelecomSecurity #Odido #Netherlands #PersonalData #Phishing #IncidentResponse #Privacy #CyberAttack

Dutch telecom provider Odido has disclosed a significant cyberattack that led to the theft of sensitive customer data belonging to around 6.2 million people. The breach, discovered on 7 February, was traced to a compromised customer contact system, allowing attackers to download personal information. Exposed data includes names, addresses, phone numbers, email addresses, bank account details and government ID information such as passport or driving licence numbers. Odido stated that its core services were not disrupted and that unauthorised access was quickly shut down. The incident has been reported to the Dutch Data Protection Authority, and affected customers will be contacted directly. While no threat actor has claimed responsibility, the company warned that stolen data could be used for impersonation and phishing attacks, urging customers to remain vigilant

→ Read more on therecord.media


#ClickFix #CyberSecurity #DNSAbuse #MicrosoftSecurity #SocialEngineering #MalwareStaging #Nslookup #ThreatIntelligence #RemoteAccessTrojan #EndpointSecurity

Microsoft has revealed a new evolution of the ClickFix social‑engineering technique that abuses DNS lookups to stealthily stage malware. In this variant, attackers trick users into running a seemingly harmless nslookup command via the Windows Run dialog. Instead of using normal web downloads, the command queries an attacker‑controlled DNS server and extracts the malicious payload directly from the DNS response. This approach allows threat actors to blend activity into routine network traffic and bypass traditional security controls. Once executed, the attack chain can download additional components, perform system reconnaissance and ultimately deploy ModeloRAT, a Python‑based remote access trojan, while ensuring persistence on the infected device. Microsoft warns that ClickFix remains effective because it relies on user trust and familiar troubleshooting steps rather than software exploits, making awareness and user education critical.

→ Read more on thehackernews.com


#DataBreach #FintechSecurity #PhishingAttack #SocialEngineering #FigureTechnology #CyberCrime #CustomerData #IdentityTheft #ShinyHunters #InformationSecurity

US‑based fintech firm Figure Technology Solutions has confirmed a data breach after an employee was deceived in a social‑engineering phishing attack, allowing hackers to access and steal a limited number of internal files. The incident prompted an internal investigation and disclosure following external inquiries. According to Figure, the breach did not stem from a technical system failure but from human manipulation, highlighting the ongoing risk posed by phishing campaigns. The cybercrime group ShinyHunters has claimed responsibility, alleging that Figure refused to pay a ransom and subsequently leaking around 2.5 GB of stolen data online. Samples of the exposed information reportedly include customers’ names, addresses, dates of birth and phone numbers, increasing the risk of identity fraud and phishing. Figure has begun notifying affected individuals and is offering free credit monitoring while continuing to assess the full impact of the breach.

→ Read more on securityaffairs.com


#Ransomware #CyberSecurity #ITSecurity #FoodSupplyChain #ZeroDay #ThreatActors #SupplyChainRisk #Qilin #Cl0p #CyberAttacks

Ransomware attacks against the IT and food sectors rose sharply in 2025, according to new reports from the IT‑ISAC and Food and Agriculture ISAC. The IT sector recorded nearly 750 incidents, more than double the total seen in 2024, as ransomware groups shifted focus to supply‑chain vulnerabilities and rapidly weaponised zero‑day flaws within hours of disclosure. The food and agriculture sector also experienced a notable increase, with 265 attacks logged in 2025, highlighting growing risks to critical supply chains. Analysts say attackers are combining faster exploitation techniques with improved social engineering and “living‑off‑the‑land” methods to evade defences. Ransomware groups Qilin and Cl0p emerged as the most active threat actors, underscoring how both targeted and opportunistic campaigns are intensifying pressure on essential industries worldwide.

→ Read more on cybersecuritydive.com


#SupplyChainAttacks #CyberCrime #IdentityAbuse #Ransomware #OpenSourceSecurity #SaaSRisk #OAuthAbuse #CI_CD #AIThreats #CyberResilience

Supply chain attacks are rapidly becoming the backbone of modern cybercrime, according to a new report highlighted by The Register. Researchers warn that attackers are no longer seeking single, one‑off breaches but are instead building a self‑reinforcing cycle that links software supply chain compromises, identity abuse and ransomware. By poisoning open‑source packages, abusing OAuth tokens and exploiting trusted SaaS and CI/CD relationships, criminals can quietly move laterally across organisations and their customers. Stolen credentials and contextual data are reused to improve impersonation and persistence, with ransomware and extortion deployed later to maximise impact. The report predicts that AI‑assisted tools will further accelerate these attacks by scanning vendor ecosystems at machine speed, while identity‑based attacks increasingly replace traditional malware. Managed service providers, HR, CRM and ERP platforms are prime targets, as a single compromise can expose hundreds of downstream victims.

→ Read more on theregister.com


#CyberThreats2026 #ArtificialIntelligence #Deepfakes #Ransomware #Phishing #PolymorphicMalware #ZeroTrust #CyberResilience #InformationSecurity #AIDrivenAttacks

Cyber threats in 2026 will be increasingly shaped by artificial intelligence, with deepfakes and AI‑powered ransomware emerging as major risks, according to Security‑Insider. Attackers are blending established techniques with new AI‑driven capabilities, creating a far more complex threat landscape. Deepfake technology is being used to impersonate executives and trusted figures, enabling fraud, reputational damage and financial loss. At the same time, Ransomware 2.0 is evolving through generative AI, allowing criminals to automate reconnaissance, craft highly convincing phishing lures and deploy polymorphic malware that adapts to its target environment and evades detection. Reinforcement learning enables malware to “learn” from failed and successful attacks, increasing its effectiveness over time. Industries such as healthcare, critical infrastructure, manufacturing, technology and financial services are particularly exposed, making zero‑trust architectures, layered defences and AI‑based detection essential for resilience in the year ahead.

→ Read more on security-insider.de


#Cyberattacks #G7Security #CyberRisk #MunichSecurityIndex #NationalSecurity #CyberThreats #Disinformation #DigitalInfrastructure #CyberCrime #GlobalRisk

Cyberattacks have been ranked as the number one security risk across all G7 countries for the second consecutive year, according to new findings reported by Cybernews. Based on the Munich Security Index 2026, citizens in Canada, France, Germany, Italy, Japan, the UK and the US now view cyber threats as more serious than economic crises or disinformation campaigns. Concern is particularly high in Germany, the UK and Japan, where around three‑quarters of respondents identified cyberattacks as their top national risk. The results highlight a dramatic shift in threat perception, with cyber risks climbing from lower rankings just a few years ago to dominate the agenda today. Analysts link this rise to increasing dependence on digital infrastructure and growing awareness of state‑sponsored and criminal cyber activity. By contrast, countries outside the G7 prioritise climate risks more highly, underlining a widening global divide in security concerns.

→ Read more on cybernews.com


#OpenClaw #Moltbot #AISecurity #CVE202625253 #CodeExecution #CyberVulnerability #Infosec #PatchNow #AIAgents #Heise

Security experts are urging organisations to patch immediately after attackers began exploiting a critical vulnerability in BeyondTrust Remote Support and Privileged Remote Access solutions. According to heise online, the flaw (CVE‑2026‑1731) allows unauthenticated remote code execution, giving attackers full control over affected systems. The vulnerability is already being actively abused, with researchers warning that unpatched instances are likely compromised. While BeyondTrust has released fixed versions and automatically secured its SaaS environments, on‑premise installations remain at high risk if administrators have not applied the updates. Thousands of exposed systems are reportedly still reachable from the internet, making them attractive targets for cybercriminals. Because older product versions are no longer supported, organisations must upgrade before patches can be installed. The incident highlights once again how rapidly attackers weaponise newly disclosed flaws and why timely patch management is critical for enterprise security.

→ Read more on heise.de


#CyberCrime #SocialEngineering #OnlineFraud #RomanceScams #EmotionalManipulation #ArtificialIntelligence #DigitalTrust #OnlineDating #CyberAwareness #HumanFactor

Cybercriminals are increasingly targeting human emotions rather than technical vulnerabilities, using manipulation to build trust and exploit personal relationships online. According to it‑daily.net, advances in artificial intelligence and conversational systems are making this approach even more effective. Chatbots and AI‑generated profiles can appear empathetic, attentive and authentic, creating a sense of emotional closeness that lowers victims’ defences. Fraud schemes such as romance scams, fake dating profiles and love bombing are becoming more convincing, with criminals exploiting basic human needs for connection, security and recognition. Research highlighted in the article shows that many online‑dating users regularly encounter suspicious profiles, while some have already been pressured into sending money. The focus of cybercrime is shifting away from stealing passwords alone towards abusing trust, intimacy and emotional dependence. Experts stress that digital awareness and emotional literacy are essential to recognise manipulation and reduce both financial and psychological harm online.

→ Read more on it-daily.net


#DataBreach #CyberSecurity #Odido #TelecomSecurity #CustomerData #PhishingRisk #IdentityTheft #Privacy #Netherlands #IncidentResponse

Dutch mobile operator Odido has disclosed a significant data breach that exposed the personal information of more than six million customers, making it one of the largest telecom incidents in the Netherlands. The breach occurred between 7 and 8 February after attackers gained unauthorised access to a customer contact system, affecting users of both Odido and its subsidiary Ben. Stolen data includes names, addresses, phone numbers, email addresses, dates of birth, bank account details and government ID information such as passport or driving licence numbers. Odido stressed that no passwords, call records or billing data were compromised and that its services remain fully operational. The company has shut down the attackers’ access, notified authorities and is contacting affected customers directly, warning them to stay alert for phishing and impersonation attempts. While no threat actor has claimed responsibility, Odido continues to monitor for potential misuse of the data.

→ Read more on securityweek.com

Contact us

+49 89 360 5310 | security-awareness@metafinanz.de

The editors are not responsible for the content of each article.