Latest Internet & Cybersecurity News

đź“…January 20, 2026 at 1:00 AM
Geopolitical tensions fuel cyber risks to infrastructure; major breaches at CIRO and Ingram Micro expose millions; ransomware and malware dominate January attacks amid rising state-sponsored threats.
1

Geopolitical Tensions Drive Cybersecurity Risks to Infrastructure

Global tensions are escalating cyber operations as tools of state competition, targeting critical infrastructure like smart grids. Russia hosts ransomware gangs, North Korea mixes espionage with crypto thefts, and China focuses on intelligence gathering.Source 1 The World Economic Forum’s Global Cybersecurity Outlook 2026 highlights cyber sovereignty reshaping security amid economic uncertainty.Source 1

2

January 2026 Cyber Attacks: 61 Incidents Led by Malware

The January 1-15 timeline reports 61 cyber events, with malware at 36%, account takeover 15%, and ransomware 11%.Source 2 Phishing is the top initial access at 15%, followed by public-facing app vulnerabilities at 14%; public administrations hit hardest at 14%.Source 2 Experts urge better phishing detection and vulnerability monitoring.Source 2

3

Cyber Insecurity Ranks High in World Economic Forum Global Risks 2026

Cyber insecurity is sixth in two-year severity and top 10 long-term risks, amid geoeconomic confrontation as the top near-term global risk.Source 3 AI amplifies threats, rising to fifth in ten-year severity; privileged access management is key for resilience.Source 3 Declining trust pushes organizations toward self-reliant defenses.Source 3

4

CIRO Phishing Breach Exposes 750,000 Canadian Investors' Data

A sophisticated phishing attack on CIRO compromised sensitive info like SINs, DOBs, incomes, and account details for 750,000 investors, confirmed January 14, 2026.Source 4Source 6 No credentials affected; part of 2025 Canadian infrastructure attacks wave.Source 4 Notifications began January 14 with protection services offered.Source 6

5

Jaguar Land Rover Cyberattack Costs UK Economy ÂŁ1.9 Billion

JLR's August 31, 2025 attack caused six weeks downtime, impacting 5,000 businesses; 'Scattered Lapsus$ Hunters' claimed responsibility via ransomware and data theft.Source 8 Employee data including bank details, salaries stolen, affecting 38,000 staff; credit monitoring provided.Source 8 Most costly UK cyber incident in history.Source 8

6

Ingram Micro Ransomware Attack Impacts 42,500 Individuals

A July 2025 ransomware attack on Ingram Micro compromised personal data of 42,500 people.Source 12 The distributor confirmed the breach's scope recently.Source 12 Details on stolen data types not specified in reports.Source 12

7

NCSC Warns of State-Aligned Hacktivists Disrupting UK Services

UK's NCSC issued alerts on Russian-aligned hacktivists targeting organizations to cripple online services and websites.Source 9 Groups aim to disable services amid ongoing threats.Source 9 Organizations urged to enhance defenses.Source 9

8

ETSI Releases Baseline Cybersecurity Standard for AI

ETSI's new European Standard sets cybersecurity requirements for AI systems, establishing a baseline for secure development.Source 7 Released around January 19, 2026.Source 7 Aims to address AI-specific risks in growing tech landscape.Source 7

9

Top Cybersecurity Projects for 2026: Zero Trust and AI Governance

CISOs prioritize identity governance, email security against advanced phishing, and AI-powered vulnerability hunting for 2026.Source 5 Enterprise AI governance and data protection frameworks are essential amid rising threats.Source 5 Bolster data governance across systems.Source 5

10

NCSC 2025 Review: Four Significant Cyber Incidents Weekly

UK NCSC reported average four nationally significant incidents weekly in 2025, with sharp rise in high-impact attacks.Source 10 Signals intensifying threats into 2026.Source 10 Organizations must prepare for persistent risks.Source 10

11

AWS Launches European Sovereign Cloud for Data Sovereignty

Amazon's AWS European Sovereign Cloud is now generally available, addressing concerns over jurisdiction and supply chains.Source 1 Meets regional legal requirements amid cyber sovereignty push.Source 1 Helps reduce foreign tech dependencies.Source 1

12

Phishing and Social Engineering Dominate Initial Access in 2026

Phishing at 15%, public app exploits 14%, social engineering 12% lead January attacks per timeline.Source 2 Public administrations most targeted sector.Source 2 Training and monitoring recommended.Source 2