This Week in Cybersecurity: Telecom Breach, Ransomware Intrusions, and Critical Infrastructure Guidance
By Heather Walters
Here’s a closer look at the major cybersecurity stories from the last seven days.
This past week’s cyber headlines again highlight the breadth and persistence of digital threats — ranging from massive personal data exposures to ransomware exploiting unpatched systems, and renewed warnings from national cybersecurity authorities about industrial control risks.
Whether you’re in security operations, risk management, or a concerned internet user, these developments are worth knowing.
Here’s a closer look at the major cybersecurity stories from the last seven days.
📱 Major Dutch telecom operator breach exposes 6.2 million customers
A significant data breach has impacted Odido, a Dutch telecommunications provider. The incident, first reported on February 13, affected approximately 6.2 million customers, with personal data — including names, addresses, phone numbers, email addresses, and identification data such as passport and driver’s license numbers — reportedly accessed by unauthorized actors. While the company states that core services like billing and calling were not disrupted, and that the data has not appeared on dark web markets yet, the volume and sensitivity of the exposure have raised widespread concern.
Read more on TechRadar
🔐 Ransomware gang breaches SmarterTools by exploiting unpatched servers
SmarterTools confirmed that its systems were breached by the Warlock (also known as Storm-2603) ransomware group after attackers exploited an unpatched instance of SmarterMail. The intrusion allowed the gang to deploy ransomware within the company environment, underscoring once again the dangers posed by publicly exposed services that lack current patches. Security experts are urging organizations to accelerate patch cycles, especially for internet-facing email and management platforms.
Read more at HackerNews
🇸🇳 Senegal confirms national ID department breach
The government of Senegal confirmed a cybersecurity incident affecting the national identification department, which forced an office closure and halted certain services. Attackers reportedly accessed systems that manage sensitive citizen identity information. Details about the method of intrusion and the extent of data accessed are still emerging, but the incident highlights ongoing vulnerabilities in public sector systems that handle personally identifiable information at scale.
Read more here.
🔧 CISA issues guidance after Poland power grid cyberattack
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) published a set of lessons learned and updated recommendations following a cyberattack on Poland’s power grid that targeted operational technology (OT) systems including wind and solar farms and a heat/power plant. Incident responders attributed the attack to poor security hygiene — such as unchanged default passwords and lack of multi-factor authentication — and highlighted outdated industrial protocols without integrity protections as ongoing risk factors for energy and critical infrastructure operators.
Read more at IT Pro.
Final thoughts
This week’s cybersecurity headlines illustrate a consistent theme: threat actors continue to evolve and diversify their tactics, hitting both private sector companies and government services while taking advantage of unpatched systems and weak operational controls. The scale of personal data exposures — especially in telecom and national ID systems — highlights the importance of proactive data protection and incident response planning.
Meanwhile, guidance from authorities like CISA reinforces that cyber-physical systems and operational technologies require specific defense strategies and cannot be treated as extensions of traditional IT infrastructure.
Staying informed, prioritizing patch management, and investing in strong identity and access controls remain essential for organizations of all sizes. Check back next week for another roundup of the major cyber threats, incidents, and developments shaping the digital security landscape.
Ready to see how OpenVPN can help protect your organization from attacks?
Try the self-hosted Access Server solution or managed CloudConnexa service for free - no credit card required.
See Which One is Right for YouHeather is a writer for OpenVPN.