In partnership with

⏱️ Read Time: 7 minutes

In 2024, attackers exploited newly disclosed vulnerabilities within 24 hours more than 60 percent of the time, according to CISA.

📜 Table of Contents

  • 🧨 Major Breaches & IncidentsSpace agencies compromised, healthcare fallout continues

  • 🕵️ Emerging Threats & VulnerabilitiesZero days, Patch Tuesday pressure, automation risks

  • 💸 Cybercrime SpotlightRansomware shifts targets and tactics

  • 🔐 Privacy WatchData protection decisions with global impact

  • 🧠 APTs & State-Sponsored AttacksGeopolitical lures and persistent espionage

  • 🤖 AI in CyberLLM infrastructure weaknesses and governance gaps

  • 🔁 Story Follow-UpsPreviously disclosed bugs confirmed exploited

🧨 Major Breaches & Incidents

  • European Space Agency Data Theft Exposes Credentials and Internal Files
    Attackers stole more than 700GB of data from the European Space Agency, including email credentials and internal documents. Some of the data is now circulating on dark web forums, while ESA continues containment and investigation efforts.
    👉 Even highly specialized government agencies remain attractive, high-value targets.

  • New Zealand Health Portal Breach Fallout Continues Into 2026
    The ManageMyHealth breach remains under investigation as notifications, audits, and regulatory reviews continue into the new year. Hundreds of thousands of patient records were exposed, extending operational and legal risk well beyond initial disclosure.
    👉 Healthcare breaches rarely end at disclosure and often create long-tail risk.

🕵️ Emerging Threats & Vulnerabilities

  • Fortinet FortiSIEM Flaw Actively Exploited in the Wild
    A critical FortiSIEM vulnerability enabling unauthenticated command execution is being actively exploited shortly after disclosure. Security teams report exploit tooling circulating publicly, reducing the time defenders have to respond.
    👉 Security platforms themselves continue to be high-value targets.

  • Microsoft January Patch Tuesday Fixes 115 Vulnerabilities
    Microsoft’s January Patch Tuesday addressed 115 vulnerabilities, including multiple critical remote code execution flaws. Several of the affected components are widely deployed in enterprise environments.
    👉 Patch volume remains high, while attacker patience remains low.

  • Cisco Zero Day Used by Chinese Threat Actors Now Patched
    Cisco released fixes for a zero-day vulnerability exploited by a China-linked group targeting Secure Email Gateway appliances. The flaw enabled persistent access and backdoor deployment before detection.
    👉 Perimeter and email infrastructure remain reliable entry points for attackers.

  • Critical Severity 10 Vulnerability Found in n8n Automation Platform
    A critical vulnerability in the n8n automation platform could allow attackers to bypass workflow logic and execute malicious payloads. Organizations using automation for orchestration or AI pipelines face elevated risk.
    👉 Automation increases efficiency, but also expands blast radius.

💸 Cybercrime Spotlight

  • Telecom Sector Sees Spike in Ransomware Activity
    Threat intelligence reports show ransomware attacks against telecom providers continuing to rise. Attackers are exploiting exposed infrastructure and unpatched systems to maximize disruption leverage.
    👉 Critical infrastructure remains a preferred pressure point for extortion.

  • Ransomware Groups Shift Focus to Cloud Identity Systems
    Ransomware operators are increasingly abusing cloud identity systems to disable defenses and maintain persistence. Compromised IAM accounts are becoming central to modern extortion campaigns.
    👉 Identity has replaced endpoints as the primary control plane.

AI-native CRM

“When I first opened Attio, I instantly got the feeling this was the next generation of CRM.”
— Margaret Shen, Head of GTM at Modal

Attio is the AI-native CRM for modern teams. With automatic enrichment, call intelligence, AI agents, flexible workflows and more, Attio works for any business and only takes minutes to set up.

Join industry leaders like Granola, Taskrabbit, Flatfile and more.

🔐 Privacy Watch

  • China Orders Firms to Drop U.S. and Israeli Cybersecurity Software
    China has reportedly instructed domestic companies to stop using certain foreign cybersecurity products. The move raises concerns about forced technology decoupling and data sovereignty implications.
    👉 Privacy, politics, and security tooling are increasingly intertwined.

  • CISA Flags Growing Risks to Citizen Data in 2026 Outlook
    CISA outlined its top challenges for 2026, emphasizing the protection of citizen data and critical services. The agency highlighted privacy risk as a persistent issue across sectors.
    👉 Public sector data protection remains under sustained pressure.

🧠 APTs & State-Sponsored Attacks

🤖 AI in Cyber

  • Large Scale Attacks Target Misconfigured Proxies Supporting LLMs
    Researchers observed tens of thousands of attacks probing misconfigured HTTP proxies supporting large language models. The activity highlights persistent weaknesses in AI infrastructure deployment.
    👉 AI systems inherit every underlying infrastructure mistake.

  • NIST Seeks Public Input on Securing AI Agents
    NIST issued a request for public input on securing autonomous AI agents. The effort focuses on misuse risks, autonomy controls, and secure design principles.
    👉 Agentic AI is advancing faster than governance frameworks.

  • Allianz Report Shows AI Rising as a Top Enterprise Risk
    A new Allianz risk report shows AI rapidly climbing executive risk rankings. Cybersecurity, regulatory uncertainty, and data misuse remain top concerns.
    👉 Executives now view AI risk as inseparable from cyber risk.

Your competitors are already automating. Here's the data.

Retail and ecommerce teams using AI for customer service are resolving 40-60% more tickets without more staff, cutting cost-per-ticket by 30%+, and handling seasonal spikes 3x faster.

But here's what separates winners from everyone else: they started with the data, not the hype.

Gladly handles the predictable volume, FAQs, routing, returns, order status, while your team focuses on customers who need a human touch. The result? Better experiences. Lower costs. Real competitive advantage. Ready to see what's possible for your business?

🔁 Story Follow-Ups

Thanks for reading this week’s edition. Like what you see? Forward it!

Hate everything you see or have other feedback? Reply back to this email!

Keep Reading

No posts found