ransomware attack

Winsage
January 16, 2026
Jen Easterly has been appointed as the new Chief Executive Officer of the RSA Conference. She is a cybersecurity expert and former Director of the Cybersecurity and Infrastructure Security Agency (CISA). Palo Alto Networks has released security updates for a vulnerability (CVE-2026-0227) with a CVSS score of 7.7 affecting its GlobalProtect Gateway and Portal, which can cause a denial-of-service condition in PAN-OS software. The January 2026 security update from Microsoft has caused connection and authentication failures in Azure Virtual Desktop and Windows 365, affecting users across various Windows versions. Microsoft is working on a resolution. The chief constable of West Midlands Police acknowledged an error by Microsoft’s Copilot AI in generating a fictional intelligence report. Microsoft has not confirmed Copilot's involvement. Britain’s National Cyber Security Centre (NCSC) has collaborated with Five Eyes partners to provide guidance on securing industrial operational technology, highlighting risks associated with remotely monitored systems. Kyowon, a South Korean conglomerate, confirmed a ransomware attack on January 10 that may have compromised customer information, affecting approximately 5.5 million members. Researchers at Varonis have identified a new attack technique called "Reprompt" that allows data exfiltration from Microsoft Copilot via a malicious link, exploiting a Parameter 2 Prompt (P2P) injection technique. Central Maine Healthcare is notifying over 145,000 patients about a data breach that compromised personal, treatment, and health insurance information, discovered on June 1.
Winsage
January 16, 2026
Microsoft has officially ceased all support for Windows Server 2008 as of January 13, 2026, including paid extended security updates. This end-of-life scenario poses significant security risks for organizations still using the outdated operating system, making them vulnerable to cyberattacks. The transition away from Windows Server 2008 requires careful planning, as many organizations face challenges in migrating legacy applications to modern systems. The lack of ongoing patches means that any new vulnerabilities will remain unaddressed, potentially leading to data breaches and compliance failures, particularly in regulated sectors like healthcare and finance. Microsoft has encouraged migration to Azure, offering incentives for early adopters, but the transition can be complex and costly. The end of support also affects global supply chains and compatibility with newer software applications. Organizations are advised to conduct audits of their software portfolios and consider hybrid environments to enhance flexibility and security.
Winsage
December 19, 2025
Microsoft has announced the phased discontinuation of the RC4 encryption cipher, with full implementation expected by mid-2026. RC4, created in 1987, has been increasingly recognized as a vulnerability, exploited in various high-profile cyberattacks. Microsoft plans to disable RC4 by default in Windows Kerberos authentication, encouraging organizations to transition to more secure alternatives like AES-256. This decision follows years of warnings from the cybersecurity community and aims to eliminate long-standing cryptographic weaknesses. The transition will require organizations to audit and upgrade their infrastructures, as many legacy applications still depend on RC4. Disabling RC4 is expected to reduce the success rates of attacks exploiting weak encryption. Microsoft has introduced tools to help administrators identify hidden RC4 usage. The change reflects a commitment to zero-trust architectures and aligns with recommendations from organizations like NIST. Experts recommend a multi-step approach for organizations to navigate this transition effectively.
Winsage
December 15, 2025
Hundreds of millions of computers are still using Windows 10, despite it reaching its end-of-support deadline. An Extended Security Updates (ESU) subscription is available for free until October 2026, providing updates to help protect against security threats. By early 2021, around 100 million PCs were still running Windows 7, which had ceased receiving updates in January 2020, making them vulnerable to cyberattacks from groups like Digital Shadows, LockBit, Conti, and Vice Society. Notable incidents include the PrintNightmare flaw in July 2021, which led Microsoft to issue a patch for Windows 7, and the WannaCry attack in 2017, which targeted Windows XP machines. Microsoft releases monthly security fixes, and vulnerabilities like CVE-2025-62215, identified in November 2025, have been categorized as "Exploitation Detected." While current vulnerabilities require local access, history suggests that remote attacks may soon occur, posing severe risks to unpatched systems.
Winsage
October 21, 2025
Many organizations are relying on Extended Security Updates (ESUs) for Microsoft’s Windows 10 as the end-of-life deadline approaches, but this solution is limited and does not protect against zero-day exploits or sophisticated attacks. The ESU program will end in October 2026, leading to increased costs and risks. Legacy systems like Windows 10 are particularly vulnerable to cybercriminals, and even with ESUs, they can be exploited by advanced threats. Transitioning to Windows 11 is complicated for many organizations due to compatibility and hardware issues. Morphisec offers a proactive solution with its Automated Moving Target Defense (AMTD) technology, which continuously alters system memory to protect against attacks without needing updates or patches. The cost of Morphisec is lower than potential expenses from ransomware incidents or ESUs. Organizations face significant risks if they delay action, as seen in past ransomware outbreaks like WannaCry. Unsupported systems can lead to compliance failures and reputational harm. Morphisec provides a way to secure Windows 10 systems while facilitating a smooth migration to Windows 11, ensuring protection across hybrid environments.
Tech Optimizer
September 30, 2025
Google has launched an AI-powered ransomware detection and recovery feature for Google Drive for desktop, available in open beta. This feature automatically detects suspicious activity indicative of ransomware attacks, pauses file syncing, and allows users to restore affected files easily. It is offered at no additional cost to most Google Workspace commercial customers and individual users. Ransomware attacks constituted 21% of all cybersecurity incidents investigated by Mandiant last year, with the average cost of such attacks exceeding million. The new capability provides an additional layer of defense beyond traditional antivirus methods, creating a protective bubble around user files. Google’s built-in virus detection also helps prevent ransomware from spreading to other devices. The AI model used for detection analyzes millions of real-world ransomware samples and adapts to new threats. When unusual activity is detected, Drive pauses syncing and alerts users, allowing for easy restoration of files. IT administrators receive alerts in the Admin console and can review detailed incident logs. This rollout enhances security controls for Workspace customers amid increasing ransomware threats.
Winsage
September 27, 2025
Microsoft will provide free extended security updates for Windows 10 users in the European Economic Area (EEA) in response to advocacy from Euroconsumers. A 17-year-old hacker, previously involved in cyberattacks on Las Vegas casinos, has been released into his parents' custody after a family court ruling. Boyd Gaming reported a cyberattack that compromised employee data but did not affect its business operations. Researchers from Binarly warned of vulnerabilities in Supermicro firmware that could allow attackers to gain control over server systems. Salesforce's Agentforce platform has a critical flaw, ForcedLeak, that could enable data extraction from its CRM tools. Kido International experienced a cyberattack that leaked sensitive information about children and parents. Volvo North America disclosed a data breach due to a ransomware attack on its supplier, Miljödata, affecting employee data. A critical flaw in the ZendTo file transfer application could allow users to access sensitive data by manipulating file paths.
Search