• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
  • X
  • Facebook
  • YouTube
  • LinkedIn
Screen Connect
Support
Customer Portal
Pay Online
SWK logo.

SWK Technologies

Software Solutions & Services

  • Accounting & ERP Software
      • Acumatica Cloud ERP
        • Overview
        • Construction
        • Distribution
        • Field Service
        • Financial Management
        • Manufacturing
        • Professional Services
        • Project Accounting
        • Retail-Commerce
      • Sage Intacct
        • Overview
        • Construction and Real Estate (CRE)
        • Distribution Operations for Sage Intacct
        • Financial Services
        • Healthcare
        • Manufacturing Operations for Sage Intacct
        • Nonprofits
        • Professional Services
        • Sage Intacct Payroll powered by ADP
      • Sage 100
        • Overview
        • Business Intelligence
        • Core Accounting & Financials
        • Distribution
        • Manufacturing
        • Payroll
        • Sage 100 Contractor
      • More Accounting Products
        • QuickBooks
        • Sage 50
        • Sage 300
        • Sage 500
        • Sage BusinessWorks
      • ERP Add-ons
        • ADP Workforce Now
        • Altec
        • Avalara
        • AvidXchange
        • BigCommerce
        • CIMCloud
        • Cloud Hosting
        • DataSelf
        • Fortis
        • FreightPOP
        • Lumber
        • Microsoft 365
        • Netstock
        • Ottimate
        • Quadient
        • Sage Fixed Assets
        • Sage HRMS
        • Sage Intacct Payroll powered by ADP
        • Savant WMS
        • Endpoint Automation Solutions (FKA Scanco)
        • ScanForce
        • Solver
        • SPS Commerce
        • Velixo
        • Workforce Go!
      • More ERP Add-ons
        • Bizinsight
        • Concur
        • Crystal Reports
        • Fraxion
        • Fusion RMS
        • FYISoft
        • JobOps
        • KnowledgeSync
        • Lockstep Collect
        • Nectari
        • Pacejet
        • Planning Maestro
        • Sage CRM
        • Sage Intelligence
        • Sage Supply Chain Intelligence
        • Scissortail HCM
        • Service Pro
        • ShipStation
        • Shopify
        • Starship
        • Sugar CRM
        • Time & Billing Pro
        • Timekeeper
        • True Sky
      • Industries
        • Construction
        • Distribution
        • Financial Services
        • Healthcare
        • Manufacturing
        • Nonprofit
        • Professional Services
        • Retail
  • Managed Cloud Services
      • Managed IT Services
        • Managed Cloud Services
        • Network Assurance Core
        • Email Hosting
        • IT Support
        • Microsoft 365 Services
        • Server Monitoring
        • Virtualization
      • Cybersecurity
          • CyberAssurance CORE™
          • Cybersecurity Solutions
          • Backup & Continuity
          • Dark Web Monitoring
          • EDR
          • Encryption
          • MFA
          • Penetration Testing
          • Security Training
          • Spam & Virus Filtering
          • vCIO
          • Vulnerability Assessment
      • Cloud Services
        • Cloud Hosting
        • Infrastructure-as-a-Service
        • Acumatica IaaS
      • Industries
        • Financial Services
        • Healthcare
        • Construction
      • Locations
          • Nationwide
          • Austin
          • California
          • Chicago
          • Minneapolis
          • New Jersey
          • New York
          • North Carolina
          • Philadelphia
          • Phoenix
          • San Diego
          • Seattle
  • Consulting & Implementation
    • Business Technology Consulting
    • eCommerce
    • Financing
    • Human Capital Management
    • Managed Cloud & IT Services
    • Partner Program
    • Software Development
    • Software Implementation
  • Resources
    • Help Desk
    • Blog Posts
    • Payments Portal
    • Webinars
    • YouTube Channels
    • Acumatica Resources
    • Sage Intacct Resources
    • Sage 100 Resources
    • IT Resource Pages
  • About
    • About SWK
    • Awards & Recognition
    • Life@SWK
    • Careers
    • Success Stories
    • SWK Gives
  • Contact
    • Contact Us
    • Support
    • Our Locations

SWK January 2026 Cybersecurity News Recap

January 22, 2026 by Hector

Home » Cybersecurity » SWK January 2026 Cybersecurity News Recap

Scrabble tiles spelling January for monthly cybersecurity news recap

A new year brings new cybersecurity headlines, and this latest News Recap by SWK Technologies covers a significant assortment of major and developing stories. January 2026 saw breaches attacks with serious fallout for companies and their customers, vulnerabilities in major systems that included Microsoft’s Copilot LLM (large language model) product and several million Bluetooth-connected devices, takedowns of major cybercrime marketplaces and more:

Ransomware Attack Exposed Manufacturer’s Proprietary iPhone Data

On January 8, the ransomware group RansomHouse announced responsibility for a cyber attack targeting Luxshare Precision Industry Co. Ltd., a Chinese electronics manufacturer that provides assembly services for Apple iPhones and iPads. The attack, estimated to have occurred December 15, 2025, employed double extortion tactics that involved both stealing data to exfiltrate it and encrypting the local copies to charge multiple ransoms. Also tracked as “Jolly Scorpius,” this ransomware gang has been active since 2023 and has targeted businesses primarily in the healthcare, manufacturing and infrastructure sectors, with over 120 victims listed publicly on their data leak site since December 2021. The files stolen in this particular attack reportedly included 3D CAD product models, circuit board layouts, internal engineering PDFs and manufacturing drawings spanning from 2019 to 2025.

Betterment Customers Targeted by Crypto Scam After Breach

Customers of the investment platform, Betterment, received fraudulent messages promoting a cryptocurrency offer, after an attacker was able to gain access to “certain systems” according to a statement by the company. The hackers supposedly compromised a third-party marketing platform, gaining access to customer data including names, email addresses, physical addresses, phone numbers and dates of birth. Though an undisclosed number of customers were affected, no account access or login credentials were compromised. However, two of Betterment’s clients affected by the breach have already filed separate lawsuits against the company. On January 13, 2026, Betterment also experienced a separate DDoS attack that caused intermittent outages from the morning to the afternoon Eastern Time, though this did not affect account security according to the company.

Microsoft Patches Copilot After Researchers Prove “Reprompt” Attack

Cybersecurity researcher Varonis Threat Labs discovered a critical vulnerability in the Microsoft Copilot Personal application that enabled silent data exfiltration through a method they dubbed “Reprompt,” potentially allowing hackers to exploit prompting functionality via phishing link. Once victims clicked on the initial malicious URL, the attacker could then work past the basic security in this version of Copilot to provide follow-up instructions to the AI that would open access to file summaries, locational data, conversation history, account data and more. The Enterprise version of Microsoft 365 Copilot was not affected due to additional security controls, however. Microsoft ostensibly fixed the bug in the January 2026 Patch Tuesday round of updates after Varonis reported it earlier in August 2025, although no evidence suggests the vulnerability was exploited in the wild as of this writing.

Cybercrime Forum BreachForums Breached

On January 9, a database containing 323,988 member records from the notorious cybercriminal forum, BreachForums, was leaked online alongside a lengthy message by a self-proclaimed hacker “mentor” calling themselves simply “James.” The data leak includes usernames, passwords, email addresses, IP addresses and registration dates, while James also listed the real names of several individuals ostensibly responsible for managing BreachForums as well as the infamous Shiny Hunters hacker collective. On January 10, a PGP private key file used by these administrators to sign official messages was also leaked. The forum has been repeatedly shut down and relaunched, with its founder Conor Fitzpatrick arrested in 2023 and sentenced to 20 years supervised release.

Vulnerability in Google Fast Pair Puts Bluetooth Devices at Risk

Researchers at KU Leuven University in Belgium discovered a critical vulnerability affecting hundreds of millions of Bluetooth audio accessories using Google’s Fast Pair protocol. Nicknamed “WhisperPair,” the flaw affects major brands including Sony, Jabra, JBL, Marshall, Xiaomi, Nothing, OnePlus, Soundcore, Logitech and Google’s own products, as well as both Android and iOS smartphones. The vulnerability stems from accessories failing to enforce a critical check, preventing them from verifying whether they are in the correct mode before responding to pairing requests and potentially allowing an attacker closer than 50 feet from the device to connect their own systems. The vulnerability was reported in August 2025 to Google, who classified it as critical and awarded the researchers a bug bounty. The only current fix is applying firmware updates from the manufacturer for each device, as disabling Fast Pair on Android phones does not prevent the attack.

Microsoft Claims Takedown of RedVDS Cybercrime Marketplace

On January 14, 2026, Microsoft announced the disruption of RedVDS, a cybercrime-as-a-service platform that been linked to $40 million in reported fraud losses in the U.S. alone since March 2025. The servers hosted common phishing tools including SuperMailer, UltraMailer, BlueMail, SquadMailer, Email Sorter Pro, Sky Email Extractor, VPNs, AnyDesk and even ChatGPT tools, as well as cyber attack services that included business email compromise (BEC), mass phishing, credential theft, account takeover and payment diversion fraud. Microsoft identified that all RedVDS virtual machines were created from a single cloned Windows Server 2022 image, sharing the same computer name, which provided a distinctive technical fingerprint for detection. The company then coordinated with law enforcement in the U.S., UK and Germany as well as the Europol agency to seize RedVDS infrastructure and domains that hosted its marketplace and customer portal.

Prepare Your Cyber Defense for 2026 with SWK Technologies

The cybersecurity stories above show threats evolving in both sophistication and scale, from ransomware groups upgrading their encryption capabilities to cybercrime marketplaces operating at industrial levels. The good news that there are ways to protect your valuable systems and data, with the right tools and expertise – get in touch with the expert team at SWK Technologies today to learn more.

Contact SWK here to discover how we can help secure your business against 2026’s top cybersecurity challenges, and beyond.

Contact Us Here

Category: Cybersecurity, Blog, IT Services, News and Events

Sidebar

Recent Posts

  • Cybersecurity Training – Why You Need More Than a Checkbox
  • How to Set Up AI Studio in Acumatica 2025 R2
  • A Brief History of the Dark Web
  • How to Combine Reporting Areas in Sage Intacct ICRW
  • Rooted in Growth: How Acumatica and SWK Technologies Helped a Commercial Landscaper Scale Smarter
  • SWK Technologies February 2026 Cybersecurity News Recap
  • Sage Intacct 2026 R1: Strategic Insights for the Modern Finance Leader

Categories

Ready to take the next step?

Contact SWK today to get in touch with one of our experts. We’ll go over your business challenges and unique needs, and see where you can unlock new value from your technology and make your operations run easier.

Get in touch!

Our Latest Posts

Person in a dark blazer standing at a whiteboard holding a tablet, with two people seated at a table with open laptops in the foreground appearing to take notes while the former is conducting cybersecurity training.

Cybersecurity Training – Why You Need More Than a Checkbox

Read moreCybersecurity Training – Why You Need More Than a Checkbox
Acumatica AI Studio LLM Prompts screen for ‘STOCK-ITEM-DESC – Stock Item Description.’ The form shows fields for Prompt ID, Prompt Name, LLM Connection, Source Form, and a Button Name of ‘Generate Description.’ The Instructions tab is open, containing markdown-style context and instructions that reference inventory fields and output requirements, with an Output Format tab and a Prompt Testing panel visible on the right side of the screen.

How to Set Up AI Studio in Acumatica 2025 R2

Read moreHow to Set Up AI Studio in Acumatica 2025 R2
Hands typing on a laptop emitting blue light in a dark room, representing activity on the dark web.

A Brief History of the Dark Web

Read moreA Brief History of the Dark Web

Awards and Accreditations

Top work places in NJ 2020.
Acumatica the Cloud ERP gold certified partner.
The Gold Microsoft partner logo on a black background.
Sage business partner diamond logo.
Dell Technologies Gold Partner
Sage tech partner logo.

Stay in the know!

Subscribe for exclusive ERP, process automation, IT and cybersecurity news.

Twitter
  • Facebook
  • YouTube
  • LinkedIn

Home
About
Contact

Support
Screen Connect
Pay Online
Downloads

SWK logo.

Headquarters:
120 Eagle Rock Ave, Suite 330
East Hanover, NJ 07936

Contact:
info@swktech.com
(877) 979-5462

Copyright © 2026 · SWK Technologies, Inc. · All Rights Reserved · Terms of Use · Privacy Policy

This site uses cookies to collect information about your browsing activities in order to provide you with more relevant content and promotional materials, and help us understand your interests and enhance the site. By continuing to browse this site you agree to the use of cookies. Visit our privacy policy to learn more.