Weekly Cybersecurity Report | Week 14, 2026

As your dedicated cybersecurity services provider, CyberOne equips you with timely and in-depth information about current cyber attacks. Discover a weekly cybersecurity report of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape.

Weekly Cybersecurity Report | Week 14, 2026

Information security updates and events from the past week

1.European Commission public platform breach

CERT-EU confirmed a major compromise of the European Commission’s public website platform, with attackers exfiltrating about 92 GB of compressed data.
The incident was linked to a compromised version of the open-source security tool Trivy, and the stolen material was later published by ShinyHunters, with analysis pointing to possible exposure across 29 additional EU entities and nearly 52,000 files related to outbound email traffic.

2.Hong Kong Hospital Authority patient-data exposure

Hong Kong’s Hospital Authority detected unauthorized access to patient information in the Kowloon East Cluster, affecting roughly 56,000 people.
The exposed data included names, HKID numbers, hospital file numbers, and surgical details, and the incident was handled as a third-party/vendor-risk event rather than a confirmed malware attack.

3.Aura breach via phone phishing

Aura disclosed a March 2026 breach after ShinyHunters used phone phishing to compromise one employee’s account for about an hour.
Attackers then reached roughly 900,000 records tied to about 20,000 current and 15,000 former customers, showing how a short-lived credential compromise can still produce large downstream exposure.

4.Sierra Management Group ransomware

Sierra Management Group reported a ransomware breach in March 2026 in which the Genesis group claimed to have stolen about 100 GB of data.
The attackers reportedly threatened public release unless ransom demands were met, reinforcing the continued shift toward data theft and extortion rather than pure encryption-only attacks.

5.North Dakota water treatment disruption

A ransomware attack disrupted a water treatment plant in Minot, North Dakota, forcing 16 hours of manual operation.
The attack did not compromise water safety or pressure, but it highlights how even short outages in utility environments can create significant operational stress and bring in federal investigators.

6.UFP Technologies and mid‑March enterprise breaches

March tracking coverage also highlighted UFP Technologies as a victim of business-data theft in an early-March incident, alongside several other enterprise compromises that surfaced through the month’s breach roundups.
These reports show the usual mix of industrial, higher-education, and healthcare targets that continue to attract attackers because of the value of their data and the operational pressure to restore quickly.

7. Broader March ransomware picture

March 2026 continued the high-volume ransomware trend seen earlier in the year, with BlackFog reporting 90 publicly disclosed attacks in March and healthcare, government, and manufacturing among the most affected sectors.
That pattern is consistent with the broader 2026 environment, where ransomware groups such as Qilin and Medusa remain active and extortion campaigns increasingly combine encryption, data theft, and leak-site pressure.

The cybersecurity attacks highlighted in this report aren’t just incidents, they’re blueprints of the adversary’s arsenal. To protect your business you need the right partner. CyberOne is here to help! Check out our services.