The week in breach news


This week’s news shows how trusted tools can quickly become risk points for both organizations and end users. A nation-state actor targeted the popular open-source code editor Notepad++, while Microsoft issued an out-of-band update to address a critical vulnerability in Microsoft Office and Microsoft 365.

North America

Notepad++

Industry: Technology Exploit: Supply Chain Attack

The popular open-source code editor Notepad++ was targeted by state-sponsored attackers in a supply-chain attack, putting the integrity of software updates at risk.

Notepad++ is a free, open-source text and source code editor for Microsoft Windows. The project confirmed that attackers quietly hijacked its software update infrastructure in a targeted campaign, intercepting and redirecting update traffic intended for notepad-plus-plus.org. This allowed malicious binaries to be delivered to select users over an extended period.

The attack unfolded over a six-month period, from June to December 2025, primarily affecting users running older versions of the WinGUp updater.

Source

How it could affect your business

This incident highlights how trusted software distribution mechanisms can become high-risk attack surfaces when infrastructure or validation controls fail. Reducing exposure requires a layered defensive approach that extends beyond patch management to include visibility, control and preparedness across the software update lifecycle.

Australia & New Zealand

Langley Twigg Law

Industry: Legal Exploit: Hacking

A Napier-based law firm, Langley Twigg Law, confirmed a cyberattack that exposed its internal systems and client information.

On January 25, the ransomware group Anubis claimed responsibility for an attack on the New Zealand law firm. A day later, the firm confirmed a malicious third-party attack on its IT network. Langley Twigg said the incident occurred on January 11 and compromised internal operational information along with some client documents.

The firm said it is still investigating the incident and will contact affected clients directly once the investigation is complete.

Source

How it could affect your business

Law firms are increasingly targeted because they hold large volumes of confidential information, including intellectual property, merger and acquisition data and sensitive client financial records. Reducing risk requires tighter third-party access controls, stronger monitoring of vendor connections and clear incident response plans to limit exposure in the event of a breach. Regular user awareness training and visibility into unusual network activity can also help detect attacks earlier.

Australia

Prosura

Industry: Insurance Exploit: Hacking

Australian insurance provider Prosura is investigating a cyber incident after fraudulent emails were sent to some of its customers.

Identified in early January, the incident led the insurer to temporarily shut down key online services. The company said it is investigating unauthorized access to parts of its internal systems, which led to fraudulent emails being sent to customers regarding their existing or completed insurance policies. The information potentially affected includes names, email addresses, phone numbers, country of residence, travel destinations, invoicing and pricing details, and policy start and end dates.

The company has also warned customers about related phishing attempts delivered via email, phone or text, which may use personal information to appear legitimate and trick recipients into further engagement.

Source

How it could affect your business

Information exposed in incidents like this can be quickly repurposed for targeted phishing, giving attackers the details they need to craft convincing messages. Strong user awareness is critical so customers and staff know how to spot suspicious emails, calls or texts — and report them before further damage occurs.

North America

Microsoft Office & Microsoft 365

Industry: Technology Exploit: Zero-day vulnerability

Last week, Microsoft issued an out-of-band update to address a high-severity vulnerability (CVSS score 7.8) affecting multiple Microsoft Office products.

The vulnerability, tracked as CVE-2026-21509, is being actively exploited in the wild and has been added to CISA’s Known Exploited Vulnerabilities Catalog. The flaw stems from how the applications rely on untrusted inputs when making security decisions, allowing attackers to bypass Object Linking and Embedding security protections in Microsoft Office and Microsoft 365. Exploitation requires convincing a user to open a specially crafted malicious Office file.

Affected software includes Microsoft Office 2016, Microsoft Office 2019, Microsoft Office LTSC 2021, Microsoft Office LTSC 2024 and Microsoft 365 Apps for Enterprise.

Source

How it could affect your business

Organizations should identify vulnerable Microsoft Office instances across their environments and apply updates or appropriate mitigations immediately. With active exploitation underway, unpatched systems remain at immediate risk.

Europe

Dresden State Art Collections

Industry: Arts & Culture Exploit: Hacking

Dresden State Art Collections, a network of 15 museums in Germany, confirmed a cyberattack that affected a significant portion of its digital infrastructure.

The attack in late January disrupted a significant portion of the museum’s network, including its online shop and visitor services. Meanwhile, a statement issued by the museum said that its physical and technical security systems were not affected and that the museum remains open to the public.

Source

How it could affect your business

Even organizations centered on physical locations like museums, can face major disruption when digital services are targeted, cutting off services that visitors and staff rely on. Any organization offering digital services needs to strengthen its cyber defenses, focusing on resilience, visibility and preparedness to keep operations running when systems are targeted.

Like what you're reading?

Subscribe now to get security news and information in your inbox every week

Upcoming webinars & events

Join our upcoming events and webinars for expert insights, practical strategies and the latest trends shaping cybersecurity.

RocketCyber Tech Jam: Real-world threat detection for MSPs

February 12, 2026 11:00 AM EST

Get a hands-on look at the RocketCyber Managed SOC and see how MSPs can deliver enterprise-grade threat detection and response without added complexity or overhead.

Register Now

Cyber resilience Q1 ’26 product innovation update

February 11, 2026 11:00 AM EST

Join Kaseya product leaders as they walk through recent innovations designed to help MSPs and IT teams reduce cyber and compliance risks, simplify recovery and maintain stronger control across hybrid environments.

Register Now