SecurityWeek’s cybersecurity information roundup offers a concise compilation of noteworthy tales that may have slipped below the radar.
We offer a helpful abstract of tales that will not warrant a complete article, however are nonetheless essential for a complete understanding of the cybersecurity panorama.
Every week, we curate and current a set of noteworthy developments, starting from the most recent vulnerability discoveries and rising assault methods to vital coverage adjustments and trade studies.
Listed below are this week’s tales:
€1.2 billion in GDPR fines
European authorities issued roughly €1.2 billion ($1.4 billion) in GDPR fines in 2025, with Eire main enforcement, accounting for a file €4.04 billion ($5.1 billion) in combination penalties since 2018, in response to a DLA Piper research. The report additionally highlights a 22% surge in private information breach notifications, which reached an all-time excessive of greater than 440 common day by day studies.Commercial. Scroll to proceed studying.
Mandiant releases Internet-NTLMv1 rainbow tables
Google Cloud’s Mandiant has publicly launched a complete dataset of Internet-NTLMv1 rainbow tables to focus on the essential insecurity of the legacy authentication protocol and speed up its deprecation. This launch demonstrates that an attacker utilizing consumer-grade {hardware} can now get well password hashes in below 12 hours, underscoring the pressing want for organizations emigrate to safer alternate options.
Interpol points Crimson Discover for Black Basta chief
Interpol has issued a Crimson Discover for Oleg Evgenievich Nefedov, who regulation enforcement authorities have recognized because the chief of the Black Basta ransomware gang. This designation follows a collaborative investigation by German and Ukrainian authorities that additionally led to raids towards suspected associates.
Cloudflare WAF bypass
FearsOff researchers recognized a vulnerability the place Cloudflare’s WAF may very well be bypassed by concentrating on particular ACME problem paths meant for certificates validation. The flaw, which has since been patched by Cloudflare, allowed attackers to succeed in origin servers immediately, doubtlessly exposing atmosphere information or facilitating different assaults even when international block guidelines have been lively.
Cloud coaching purposes exploited
Pentera researchers found that 1000’s of uncovered cloud coaching purposes, together with ones hosted by Fortune 500 firms and safety companies, are being actively exploited by attackers for crypto-mining and different unauthorized actions. These weak environments steadily make the most of overly permissive cloud roles, offering adversaries with a possible foothold to maneuver laterally into broader company cloud infrastructure.
Canonical Snap Retailer abused for malware supply
Safety researcher Alan Pope studies that scammers are hijacking respectable Canonical Snap Retailer writer accounts by registering expired domains related to these accounts to set off password resets. As soon as in management, these attackers push malicious updates to established, reliable purposes to deploy cryptocurrency wallet-draining malware.
Rockwell Automation safety discover
Rockwell Automation has issued a high-severity advisory concerning a number of DoS vulnerabilities in its 1756-RM2 ControlLogix Redundancy Modules, which may trigger units to turn out to be unresponsive or expertise nonrecoverable faults. No firmware updates are deliberate for the affected {hardware} and the corporate strongly recommends that prospects improve to the newer 1756-RM3 modules to mitigate the dangers.
Curl terminating bug bounty program
The open supply mission curl is terminating its bug bounty program on the finish of January 2026 because of a surge in low-quality, AI-generated vulnerability studies. Lead maintainer Daniel Stenberg said that the transfer goals to take away monetary incentives for ‘AI slop’ that has overwhelmed the safety group’s assets whereas failing to determine legitimate vulnerabilities.
300,000 affected by Minnesota Division of Human Companies information breach
The Minnesota Division of Human Companies has knowledgeable the general public a few information breach involving its MnCHOICES system, which is used for long-term care providers and assist planning for individuals with disabilities or persistent wants. FEI Programs, the agency that manages MnCHOICES, found {that a} consumer related to a supplier had entry to the demographic info of greater than 300,000 individuals, in addition to extra information for 1,200 of them. There is no such thing as a proof that the knowledge has been misused.
Associated: In Different Information: 8,000 Ransomware Assaults, China Hacked US Gov Emails, IDHS Breach Impacts 700k
Associated: In Different Information: FortiSIEM Flaw Exploited, Sean Plankey Renominated, Russia’s Polish Grid Assault
