Major Data Breaches
Crunchbase Data Breach Confirmed
Priority: Critical
Headline: Crunchbase Refuses Ransom, 2M+ Company Files Exposed
Summary:
In early February, Crunchbase, a global business intelligence platform, confirmed a significant data breach after refusing to pay a ransom to the ShinyHunters group. The attackers retaliated by leaking over 2 million company files on the dark web. The breach exposed sensitive business relationships, competitive intelligence, and increased the risk of account takeovers and phishing campaigns. The incident highlights the growing threat of ransomware groups targeting high-value business data and the risks associated with refusing ransom demands.
Key Details:
- Organization: Crunchbase
- Data Exposed: Over 2 million company files, including sensitive business information
- Attack Vector: Ransomware (ShinyHunters group)
- Discovery Date: Early February 2026
- Response: Public confirmation, refusal to pay ransom, incident under investigation
Technical Details:
- Threat Actor: ShinyHunters
- Data Exfiltration: Confirmed
- Ransom Demand: Not disclosed
- Potential Impact: Account takeovers, phishing, secondary breaches via credential reuse
Cross-reference notes:
Cybernews provides the most detailed account, with confirmation from Crunchbase and analysis of the potential business impact1.
Match Group Dating Platforms Targeted
Priority: High
Headline: ShinyHunters Breach Hits Match.com, Hinge, OkCupid
Summary:
The ShinyHunters group also targeted several Match Group dating platforms, including Match.com, Hinge, and OkCupid, siphoning over 10 million records. The breach was reportedly facilitated through a vishing (voice phishing) attack and exploitation of a third-party analytics platform. Exposed data includes user IDs, transaction details, IP addresses, and internal documents. Bumble was also named as a victim, though the company denies user data exposure.
Key Details:
- Organizations: Match.com, Hinge, OkCupid (Match Group)
- Data Exposed: User IDs, transaction details, IP addresses, dating profiles, internal documents
- Attack Vector: Vishing, third-party compromise (AppsFlyer)
- Discovery Date: Early February 2026
- Response: Ongoing investigation, some companies deny exposure
Technical Details:
- Threat Actor: ShinyHunters
- Data Exfiltration: Confirmed for Match Group platforms
- Potential Impact: Phishing, account compromise, privacy risks
Cross-reference notes:
Cybernews and other sources confirm the scale and method of the breach, with some conflicting statements from affected companies1.
Significant Cyberattacks
Poland Energy Sector Cyber Incident
Priority: Critical
Headline: CISA Highlights OT and ICS Security Gaps After Polish Power Grid Attack
Summary:
On February 10, 2026, CISA issued an alert following a cyber incident targeting Poland’s energy sector. The attack exposed significant security gaps in operational technology (OT) and industrial control systems (ICS), raising concerns about the resilience of critical infrastructure. CISA’s advisory emphasized the need for improved authentication and segmentation in OT environments.
Key Details:
- Sector: Energy (Poland)
- Attack Vector: Not specified (likely targeted OT/ICS systems)
- Discovery Date: February 10, 2026
- Response: CISA alert, recommendations for OT/ICS security improvements
Technical Details:
- Mitigation: Enhanced authentication, network segmentation, monitoring
- Impact: Highlighted vulnerabilities in critical infrastructure
Cross-reference notes:
CISA’s official alert is the primary source, with additional context from industry analysis2.
Ransomware Attacks on IT and Food Sectors
Priority: High
Headline: Ransomware Surge Targets IT and Food Industries
Summary:
Recent reports indicate a surge in ransomware attacks against IT and food sector organizations. Attackers are increasingly leveraging social engineering and zero-day vulnerabilities to gain initial access. The trend underscores the need for rapid patching and employee awareness training.
Key Details:
- Sectors: IT, Food
- Attack Vector: Social engineering, zero-day exploitation
- Discovery Date: February 2026
- Response: Ongoing incident response, sector advisories
Technical Details:
- Tactics: Phishing, exploitation of unpatched systems
- Impact: Operational disruption, data exfiltration
Cross-reference notes:
Cybersecurity Dive and sector ISACs provide corroborating details3.
Critical Vulnerabilities
CISA Adds Multiple Exploited Vulnerabilities to Catalog
Priority: Critical
Headline: CISA Catalogs 11 New Actively Exploited Vulnerabilities
Summary:
Between February 10 and 13, 2026, CISA added a total of 11 new vulnerabilities to its Known Exploited Vulnerabilities Catalog. These include flaws in widely used enterprise software and network devices, with several already under active exploitation. CISA urges immediate patching and mitigation.
Key Details:
- Date: February 10–13, 2026
- Vulnerabilities: 11 new entries (details available on CISA website)
- Affected Products: Enterprise software, network devices
- Response: Federal agencies and private sector urged to patch immediately
Technical Details:
- CVE Numbers: See CISA catalog for full list
- Exploitation: Confirmed in the wild
- Mitigation: Apply vendor patches, follow CISA guidance
Cross-reference notes:
CISA advisories are the authoritative source for vulnerability details2.
Critical Flaw in BeyondTrust Remote Support
Priority: High
Headline: Early Exploitation of BeyondTrust Remote Support Vulnerability
Summary:
A critical vulnerability in BeyondTrust Remote Support is seeing early signs of exploitation. The flaw could allow attackers to gain unauthorized access to sensitive systems. Organizations using BeyondTrust are advised to review their deployments and apply patches as soon as possible.
Key Details:
- Product: BeyondTrust Remote Support
- Vulnerability: Critical (details pending CVE assignment)
- Discovery Date: February 2026
- Response: Vendor patches released, CISA alert issued
Technical Details:
- Attack Vector: Remote code execution
- Mitigation: Immediate patching, review of access controls
Cross-reference notes:
Cybersecurity Dive and CISA advisories confirm the vulnerability and exploitation status3.
Government Responses
CISA Advisories and Alerts
Priority: High
Headline: CISA Issues Multiple Alerts on Exploited Vulnerabilities and Sector Threats
Summary:
CISA released several alerts and advisories during the week, including guidance on securing OT/ICS environments and updates to the Known Exploited Vulnerabilities Catalog. The agency continues to emphasize the importance of rapid patching and sector-specific risk mitigation.
Key Details:
- Date: February 10–13, 2026
- Topics: OT/ICS security, exploited vulnerabilities, sector-specific threats
- Response: Federal and private sector organizations urged to review and implement recommendations
Technical Details:
- Resources: CISA advisories, sector-specific guidance
Cross-reference notes:
All information confirmed via CISA’s official website2.
Miscellaneous
Industry Trends and Analysis
Priority: Medium
Headline: Social Engineering and Supply Chain Attacks on the Rise
Summary:
Industry analysis highlights a continued increase in social engineering attacks and supply chain compromises. Threat actors are adapting quickly, leveraging new tools and techniques to bypass traditional defenses. Organizations are encouraged to enhance employee training and review third-party risk management practices.
Key Details:
- Trends: Social engineering, supply chain attacks, rapid weaponization of zero-days
- Response: Enhanced training, third-party risk assessments
Cross-reference notes:
Cybersecurity Dive and sector ISACs provide supporting analysis3.
Source List
- Cybernews: January’s Biggest Data Breaches1
- CISA Cybersecurity Alerts & Advisories2
- Cybersecurity Dive: News and Analysis3
Note: This review covers incidents and developments from Tuesday, February 10, 2026, through Monday, February 16, 2026. All information is sourced from authoritative cybersecurity publications and government advisories. For technical details and mitigation guidance, consult the linked resources.
