News Roundup
NEWS ROUNDUP – 30th January 2026
Nike investigated an extortion-linked breach claim, Rotterdam port operations faced hacktivist-driven DDoS disruption, and CISA added actively exploited Ivanti EPMM vulnerabilities to its KEV catalogue. Law enforcement seized the RAMP cybercrime forum, while NIST advanced its Cyber AI Profile consultation. Identity compromise, control-plane abuse, and data-only extortion dominated incident response priorities globally.
NEWS ROUNDUP – 28th January 2026
This cycle reinforces that routine security work, standards updates, browser fixes in flight, and edge-device advisories, directly shapes investigation quality and response speed when exploitation pressure rises. High-trust automation platforms and perimeter systems remain prime targets, so teams should prioritise patch validation, token rotation, and log preservation to contain blast radius and defend decisions under regulatory and customer scrutiny forensics-ready incident narratives.
NEWS ROUNDUP – 26th January 2026
Microsoft issued out-of-band Windows fixes for Outlook freezes and probed post-update boot failures as investigators tracked Cambodia-based scam networks repatriated to South Korea. ESET tied Sandworm to a DynoWiper power-sector attempt, while Fortinet and CISA warned on FortiCloud SSO abuse and exploited vCenter flaws. Policy moves spanned NHS supplier assurance, Australian smart-device rules, and Korean breach scrutiny in this window.
NEWS ROUNDUP – 23rd January 2026
Cisco patched a Unified Communications RCE (CVE-2026-20045) amid active exploitation, while CSA Singapore urged urgent updates. CISA issued a batch of ICS advisories for OT operators. Investigators tracked the Telegram-linked Tudou Guarantee marketplace and authorities tied suspects to Black Basta. Policy moved on Ireland’s spyware law, EU high-risk vendor phase-out, and UK NIS Bill progress. Chainlit flaws threatened cloud apps.
NEWS ROUNDUP – 21st January 2026
Over the past 48 hours, responders tracked UK warnings on Russia-aligned DDoS activity, Ingram Micro’s disclosure affecting 42,000 people, and a brief hijack of Iranian state television feeds. Investigations detailed LinkedIn-delivered malware and Gemini prompt injection, while policymakers advanced EU cybersecurity reforms, new UK fraud reporting, and Singapore issued fresh vulnerability advisories impacting cloud deployments, broadcast resilience, and response planning.
