As your dedicated cybersecurity services provider, CyberOne equips you with timely and in-depth information about current cyber attacks. Discover a weekly cybersecurity report of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape.
Weekly Cybersecurity Report | Week 15, 2026
Information security updates and events from the past week
1.Delhi cyber fraud network takedown
Delhi Police dismantled an international cyber fraud syndicate tied to 2,567 complaints and losses exceeding Rs 300 crore, arresting 11 suspects including the alleged mastermind.
Investigators said the group used fake WhatsApp links, over 100 SIM cards, and scam infrastructure posing as trade platforms and insurance companies to steal money from victims across India.
2.North Dakota water plant ransomware
A ransomware attack disrupted a water treatment facility in Minot, North Dakota, forcing 16 hours of manual operation.
The attack did not compromise water safety or pressure, but it again showed how utility operators remain attractive targets because even short outages can create immediate operational risk.
3.Marquis fintech breach fallout
Marquis, the Texas-based fintech provider, continued to surface in April reporting after its ransomware-linked breach exposed sensitive personal and financial information for 672,075 people.
The compromised data included names, dates of birth, Social Security numbers, bank account details, and credit/debit card numbers, with SonicWall firewall exposure cited as part of the attack path.
4.April Ransomware Landscape
BlackFog’s April ransomware reporting showed March closed with 90 publicly disclosed attacks, with healthcare the most targeted sector and the United States accounting for 60% of public cases.
This week’s reporting also pointed to active Medusa-related activity and cloud/supply-chain compromise patterns, reinforcing that data theft and extortion remain the dominant attacker model in 2026.
5.Broader early-April threat picture
Early-April threat roundups highlighted a fast-moving mix of supply-chain attacks, BEC fraud, SaaS abuse, and cloud-focused intrusion techniques, including cases involving Axios/PyPI-style compromise patterns and malicious code lures.
The common theme is that attackers are increasingly exploiting trust relationships, third-party platforms, and exposed online services rather than relying only on traditional malware delivery.
The cybersecurity attacks highlighted in this report aren’t just incidents, they’re blueprints of the adversary’s arsenal. To protect your business you need the right partner. CyberOne is here to help! Check out our services.