This Week in Cybersecurity: Welcome to 2026
By Heather Walters
It's not quite a happy new year for folks finding themselves in the cybersecurity headlines.
From ransomware and insider betrayals to space agency data concerns, the first week of 2026 has already delivered a host of headline-worthy cybersecurity events. Here’s a look at the most significant stories shaping the threat landscape right now.
👨💻 Two U.S. Cybersecurity Experts Plead Guilty to Ransomware Attacks
In a striking breach of trust, two U.S. cybersecurity professionals have pleaded guilty to conspiring with the ALPHV/BlackCat ransomware gang to launch ransomware attacks and extortion schemes against multiple American companies. Former incident response and ransomware negotiator experts used their insider knowledge to assist with encrypting victims and demanding cryptocurrency ransoms — some near $10 million. They now face up to 20 years in prison for conspiracy to obstruct commerce through extortion.
➡️ Read more
✈️ Korean Air Catering & Duty-Free suffers major data breach
Approximately 30,000 current and former employees of Korean Air were affected by a significant data breach linked to a supply-chain attack on Korean Air Catering & Duty-Free (KC&D), which used Oracle E-Business Suite software that was previously exploited via a critical vulnerability. The ransomware group Cl0p claimed responsibility, leaking roughly 500 GB of employee data including names and bank account numbers. =
➡️ Read more
🎮 Rainbow Six Siege hacked twice in one week
Gamers experienced a double whammy as Rainbow Six Siege — a top multiplayer title — was hacked twice within days. The attackers leveraged a critical database flaw known as “MongoBleed”, resulting in the injection of roughly 2 billion in-game credits (valued at about $13.3 million) into the game’s economy before systems were taken offline to stop the exploits. Zero-Day Wire
➡️ Read more
🏥 New Zealand patient portal hit with ransomware
On New Year’s Eve, New Zealand’s largest patient portal, ManageMyHealth, was breached by the Kazu ransomware group. The attack impacted about 1.8 million users, exposing sensitive medical records, including diagnoses and prescriptions. The attackers demanded roughly $60,000 to avoid publication of stolen data. Healthcare data remains one of the most lucrative targets on the dark web — often worth far more than credit card information.
➡️ Read more
🔑 Key takeaways
-
Insider risk is real: Even cybersecurity professionals can become threat actors, as shown in the ALPHV/BlackCat case.
-
Supply-chain and third-party attacks continue: Vendor platforms and external hosting services are frequent compromise points.
-
Healthcare and community platforms are attractive targets: Patient portals and social networks are being leveraged for identity theft and privacy invasion.
-
Gaming ecosystems are not immune: High-value virtual assets and exploitable flaws make games a target too.
💭 Final thought
The first week of 2026 is already a stark reminder: cyber threats don’t pause with the calendar flip. From ransomware extortion to precise location leaks and insider betrayals, the variety of attacks shows that defenders must be vigilant across all fronts, not just traditional perimeter defenses.
Ready to see how OpenVPN can help protect your organization from attacks?
Try the self-hosted Access Server solution or managed CloudConnexa service for free - no credit card required.
See Which One is Right for YouHeather is a writer for OpenVPN.