Archive for February 5, 2026

China Warns of OpenClaw Open-Source AI Agent Security Risks

Posted in Commentary with tags on February 5, 2026 by itnerd

China’s industry ministry has warned that the OpenClaw open-source AI agent could pose significant security risks when improperly configured and expose users to cyberattacks and data breaches.

More info can be found here: https://www.reuters.com/world/china/china-warns-security-risks-linked-openclaw-open-source-ai-agent-2026-02-05/

Ensar Seker, CISO at SOCRadar:

“This warning isn’t really about China versus open source, it’s about a familiar pattern we’ve seen repeatedly with fast-moving AI agent frameworks like OpenClaw. When agent platforms go viral faster than security practices mature, misconfiguration becomes the primary attack surface. The risk isn’t the agent itself; it’s exposing autonomous tooling to public networks without hardened identity, access control, and execution boundaries.

“What’s notable here is that the Chinese regulator is explicitly calling out configuration risk rather than banning the technology. That aligns with what defenders already know: agent frameworks amplify both productivity and blast radius. A single exposed endpoint or overly permissive plugin can turn an AI agent into an unintentional automation layer for attackers.

“This should be a wake-up call globally. AI agents need to be treated like internet-facing services, not experimental scripts. That means threat modeling, least-privilege identities, continuous monitoring, and clear separation between reasoning, action, and data access. Without that, “agentic” systems don’t just scale intelligence, they scale mistakes.”

Henrique Teixeira, SVP of Strategy at Saviynt:

“The Chinese Ministry of Industry and Information Technology warning is valid. The point most people miss, however, is that OpenClaw (aka Moltbot, Clawdbot), even when properly configured, still poses a lot of identity security risks. If I had to simplify how OpenClaw credentials work it’s basically this: if you want your bot to do useful stuff, you need to provide it credentials (either username and passwords, cryptographic keys, etc.) with high levels of permissions. For example: if you want to have OpenClaw streamline your Gmail inbox, you need to give it a full pass to your email account. How most people will handle that poses a huge risk of credential exposure. Best case, they will follow steps like this  https://setupopenclaw.com/blog/openclaw-gmail-integration). This is the best case, which is using an OAuth flow for consent, instead of simply hardcoding your email and password somewhere. But it still involves steps like generating JSON files and some light coding that not everyone may feel comfortable with. And in the end, this process is still flagged as “unsafe” by Google, as OpenClaw’s app has not been verified by them. That’s a warning that some people will ignore, but identity security-conscious people shouldn’t. Assuming that OpenClaw is “my app” and it’s accessing “my inbox” is all the security vetting necessary is the same as accepting that it’s ok for me to use a very weak password on my company laptop, because I don’t have anything important in it. It glosses over the fact that most modern breaches according to research, were initiated by abusing existing credentials from employees and contractors. Anyone is a valid target, and attackers can use that initial access to move laterally and escalate privileges to access more sensitive stuff. In the OpenClaw Gmail example, that OAuth token is not immune from being stolen or reused. The user just created one more spot where credentials are now exposed. And the bot itself could be poisoned with external prompts to share more details of the permissions it carries. In summary the alarm is valid. But not for the reasons most people think it’s valid!”

AI is the new hotness as the kids say. But it has risks. This is the latest of those risks. So this is a case of user beware that you should likely pay attention to.

Sharp Canada Introduces Next-gen EC Series dvLED

Posted in Commentary with tags on February 5, 2026 by itnerd

Sharp Electronics of Canada Ltd. today unveiled the Sharp EC Series dvLED, the latest expansion of its essential dvLED portfolio. The EC Series delivers exceptional visual performance, simplified installation and significantly improved energy efficiency, powered by advanced Chip-on-Board (COB) technology. Built on Sharp’s global leadership in display innovation, the EC Series answers growing demand for sustainable, cost-effective and future-ready large-format display solutions.

Redefining dvLED for Canadian Businesses and Institutions

The EC Series expands Sharp’s E Series family with a new generation of direct-view LED displays designed for retail, corporate, education and public-space environments. Engineered for reliability and performance, the EC Series supports impactful visual communication across a wide range of professional applications.

The Chip-on-Board (COB) Advantage: Smarter by Design

At the core of the EC Series is advanced Chip-on-Board (COB) construction, a manufacturing approach that bonds multiple LED chips directly onto the display substrate. This design delivers measurable benefits throughout the product lifecycle:

  • Superior energy efficiency: COB technology can cut power use by up to 60 per cent compared with traditional Surface-Mounted Device (SMD) LEDs, reducing energy costs and environmental impact while maintaining brightness.
  • Enhanced durability: Protective encapsulation gives the EC Series a durable, touch-friendly surface that resists dust and impact, ideal for high-traffic, interactive environments.
  • Outstanding image quality: Dense LED integration enables vivid colour reproduction, deep blacks and contrast ratios of up to 10,000:1, resulting in crisp, uniform visuals.

Designed for Efficiency from Installation to Operation

Sharp’s intuitive EC Series cabinet design can cut installation time by up to 50 per cent versus conventional dvLEDs. With faster setup, lower operating costs and simpler deployment, it’s an efficient, practical choice from day one.

Flexible Configuration for Diverse Spaces

The EC Series is available in fine pixel pitches of 0.9, 1.2, 1.5 and 1.8 mm, ensuring optimal resolution and viewing performance across applications ranging from collaborative corporate spaces to dynamic retail signage.

The EC Series is scheduled to begin shipping in April 2026.

Sharp’s dvLED Video Displays

Sharp’s full line of indoor and outdoor direct view LED (dvLED) video displays is designed to provide stunning clarity, effortless scalability and enterprise-grade reliability, making them a gamechanger for corporate spaces, digital signage and immersive experiences. With their cutting-edge image quality, plug-and-play simplicity, flexible and scalable design, energy efficiency and enhanced durability, Sharp dvLED displays set a new standard for how businesses, institutions and brands communicate visually.

Recently, Sharp Canada partnered with Diversified to help shape the future of learning and innovation at Western University. At the heart of Western’s Schmeichel Innovation and Entrepreneurship Centre, Sharp dvLED displays were strategically positioned in spaces for internal events, lectures and large gatherings, setting a new standard for visual excellence. With ultra slim profiles and neutral finishes, Sharp dvLED displays integrate seamlessly into the architecture, enhancing academic, administrative and cultural programming with professional grade clarity and reliability.

For more information, visit https://sharp.ca/en/products/business-displays-dvled/.

Vibe-coded Moltbook security flaw leaks AI agent credentials

Posted in Commentary with tags on February 5, 2026 by itnerd

A new social media platform called Moltbook, designed for AI agents to interact with each other and “hang out”, was found to have a misconfiguration, leaving its backend database publicly accessible allowing full read and write access to all data, according to a recent blog post by Wiz Security.

Researchers discovered a Supabase API key exposed in client-side JavaScript revealing thousands of private AI conversations, 30,000 user email addresses, and 1.5 million API keys..

   “Supabase is a popular open source Firebase alternative providing hosted PostgreSQL databases with REST APIs. It’s become especially popular with vibe-coded applications due to its ease of setup,” explained Wiz head of threat exposure, Gal Nagli.

   “When properly configured with Row Level Security (RLS), the public API key is safe to expose – it acts like a project identifier. However, without RLS policies, this key grants full database access to anyone who has it. In Moltbook’s implementation, this critical line of defense was missing.”

In a message posted to X before the Wiz posted the blog, Moltbook’s creator, Matt Schlicht said he “didn’t write one line of code” for the site. Wiz reported the vulnerability to Schlicht, and the database was secured.

   “As we see over and over again with vibe coding, although it runs very fast, many times people forget the basics of security,” Wiz cofounder Ami Luttwak said.

Sunil Gottumukkala, CEO, Averlon:

   “What this highlights is the tradeoff vibe coding creates. It massively compresses idea-to-product time, but often skips essential security steps like threat modeling, secure defaults, and review gates that account for real user behavior and adversarial abuse.

   “When those controls are missing, a routine misconfiguration, such as shipping without proper authorization or RLS policies, can quickly turn into an instant, internet-scale incident. Some vibe-coding platforms are starting to add guardrails, but we’re still early. As long as speed continues to outpace security analysis and remediation, this will be a bumpy road.”

Lydia Zhang, President & Co-Founder,Ridge Security Technology Inc. gave me this comment:

   “This leads to another mandatory step: testing. Zero-trust principles should also be applied to Vibe coding. Vibe-coded solutions can miss basic security practices, and configuration or misconfiguration issues are often outside the scope of the code itself. I’m glad Wiz Security caught this before the damage spread further.”

Michael Bell, Founder & CEO, Suzu Labs added this comment:

   “The Moltbook incident shows what happens when people shipping production applications have no security training and are relying entirely on AI-generated code. The creator said publicly that he didn’t write a single line of code. Current AI coding tools don’t reason about security on the developer’s behalf. They generate functional code, not secure code.

   “The specific failure here was a single Supabase configuration setting. Row Level Security was disabled, which meant the API key that’s supposed to be safe to expose became a skeleton key to the entire database. That’s not a sophisticated vulnerability. It’s a checkbox that never got checked, and nobody reviewed the code to notice. When 10% of apps built on vibe coding platforms (CursorGuard) have the same misconfiguration, that’s not a user error problem. That’s a systemic failure in how these tools are designed.

   “The write access vulnerability should concern anyone building AI agent infrastructure. Moltbook wasn’t just leaking data. Anyone with the exposed API key could modify posts that AI agents were reading and responding to. That’s prompt injection at ecosystem scale. You could manipulate the information environment that shapes how thousands of AI agents behave.

   “Users shared OpenAI API keys in private messages assuming those messages were private. One platform’s misconfiguration turned into credential exposure for unrelated services. As AI ecosystems become more interconnected, these cascading failures become the norm.

   “The 88:1 agent-to-human ratio should make everyone skeptical of AI adoption metrics going forward. Moltbook claimed 1.5 million agents. The reality was 17,000 humans running bot armies. No rate limiting. No verification. The platform couldn’t distinguish between an actual AI agent and a human with a script pretending to be one.

   “We’re going to see a lot of “AI-powered” metrics that look impressive until you examine what’s actually behind them. Participation numbers, engagement statistics, autonomous behavior claims. Without verification mechanisms, the numbers are meaningless. The AI internet is coming, but right now it’s mostly humans wearing AI masks.

   “If you’re deploying vibe-coded applications to production, you need security review by someone who understands both the code and the infrastructure it runs on. AI tools don’t have security reasoning built in, which means every configuration decision is a potential exposure. We help organizations identify exactly these kinds of gaps through security assessments that trace data flows and access controls. The discovery process that found this vulnerability took Wiz researchers minutes of looking at client-side JavaScript. That’s the same level of effort an attacker would spend.

   “AI development velocity and AI security maturity are on completely different curves. Teams are shipping production applications in days. Security practices haven’t caught up. Until AI tools start generating secure defaults and flagging dangerous configurations automatically, humans (or hackers) need to be in the loop reviewing what gets deployed.”

Ryan McCurdy, VP of Marketing, Liquibase contributed this:

   “Moltbook is a textbook example of what happens when you ship at AI speed without change control at the database layer. A single missing guardrail turned a “public” Supabase key into full read and write access, exposing private agent conversations, user emails, and a massive pile of credentials. This is why Database Change Governance matters.

   “The highest risk changes are often permissions, policies, and access rules, and those need automated checks, separation of duties, drift detection, and audit-ready evidence before anything hits production. AI agents and vibe-coded apps will only amplify the blast radius if database change is not governed.”

Noelle Murata, Sr. Security Engineer, Xcape, Inc. served up this comment:

   “Matt Schlicht’s admission that he “didn’t write one line of code” isn’t something to celebrate, given the fundamental nature of the security flaw. The database completely lacked Row Level Security (RLS) policies, allowing anyone to access it without authentication. This misconfiguration exposed the entire database structure and content, including tokens that granted read/write/edit access to non-authenticated users – a basic oversight with serious consequences.

   “Vibe-coding,” or relying on AI to generate code, can produce functional results but often sacrifices best practices in architecture and security for speed and convenience. Without code review or highly specific prompting, AI-generated code prioritizes “fast and easy” over “resilient and secure.” This is analogous to why junior developers need oversight; the same principle applies to AI-generated code.

   “Despite Moltbook being marketed as a social platform “for bots, by bots,” it had a significant human user base: 17,000 humans alongside 1.5 million bots, creating a roughly 1:88 ratio. Notably, no CAPTCHA or human/bot validation system was implemented, raising questions about the platform’s actual purpose and user management.

   “This incident demonstrates that AI-generated applications require careful monitoring and professional oversight. Software development still demands review by trained, experienced humans to ensure security and reliability.”

This highlights the danger of vibe coding. You can get stuff done. But how it gets done might be a problem. You might want to keep that in mind if you rely on vibe coding.

BigHammer.ai to Replace the Legacy Data Stack with AI Agents

Posted in Commentary with tags on February 5, 2026 by itnerd

AI start-up, BigHammer.ai, launched today with a bold ambition: to disrupt the $500bn data and analytics market. BigHammer.ai’s team of AI Agents work together as a virtual data engineering function – redefining how data products are built, governed and run at scale. 

As organizations struggle under the weight of fragmented data tools, siloed teams, and rising labor and platform costs, BigHammer.ai offers a fundamentally new operating model. Instead of assembling and maintaining complex stacks of legacy point solutions, BigHammer.ai’s team of AI agents automate data pipeline development, operations and governance end to end across the entire data lifecycle. 

Built for modern data and analytics teams, BigHammer.ai replaces today’s disconnected tools and manual workflows with AI agents that can learn, plan, build, make decisions and act independently. The result is faster delivery, lower cost and dramatically reduced operational complexity – without sacrificing control, compliance or trust.

The AI agents are instructed and managed via natural language interfaces, enabling closer collaboration between business and technical teams – empowering citizen data engineers through self-service and reducing reliance on specialist engineering resources. 

Unlike copilots that sit on top of existing tools and therefore only see part of the stack, BigHammer.ai is AI-native by design. Its agents securely ingest, catalog and govern data, build and operate complex pipelines, and deliver analytics-ready data and insights. As a result, organizations can:

  • Scale data and AI without scaling headcount, cutting operational and labor costs by up to 70%.
  • Deliver insights faster, removing engineering bottlenecks and empowering technical data engineers and citizen data engineers to build data products up to 70% faster.
  • Radically simplify the data stack, accelerating legacy migration and rationalization while reducing total cost of ownership (TCO) by up to 30%.
  • Automate governance and compliance, maintaining end-to-end data integrity, security and provenance across the entire lifecycle.   

Founder Srinath Reddy B, formerly Head of Data Platforms & Engineering at Dun & Bradstreet and Head of Data at Aon, brings over 20+ years of frontline experience building and running large-scale data and analytical platforms. 

Four AI powered super agents, one coordinated approach

At the heart of BigHammer.ai are four specialized agents. Each agent has a defined persona, collaborates seamlessly with other agents, and is orchestrated by a meta-model that plans, coordinates and optimizes work across the data lifecycle – continuously improving as agents learn and share knowledge across deployments:

  • Agent DataGov provides end-to-end data governance to inform and set guardrails for all agents while, delivering trust and transparency through metadata, lineage, quality and compliance.
  • Agent Pipeline builds pipelines and accelerates modernization, using natural language to generate production-ready pipelines and support the migration of legacy data/code.
  • Agent DataOps monitors and improves reliability across the data estate, including cost, latency and data quality signals. It reduces operational toil, accelerates the incident response, and finds opportunities to save costs.
  • Agent Xplore helps teams explore and analyze data faster, enabling natural language-driven discovery, deep insights on data and next best action recommendations.

For more information, visit the website, or request a demo.

Guardsquare Acquires Verimatrix XTD

Posted in Commentary with tags on February 5, 2026 by itnerd

Guardsquare today announced it has completed the acquisition of the Extended Threat Defense (XTD) technology and assets from Verimatrix (Euronext Paris: VMX), further advancing its mobile app security platform for mobile developers and enterprises worldwide. The deal marks a significant milestone for the company, reinforcing its commitment to delivering the highest level of mobile application security without compromise.

Verimatrix’s XTD technology predicts, detects, and responds to threats before mobile apps are exploited. Guardsquare’s acquisition of XTD reinforces its commitment to delivering the most comprehensive mobile application security. This approach reflects the growing urgency organizations face in securing mobile applications. According to Verizon, 85% of organizations are experiencing a surge in mobile attacks, and 43% cite mobile app threats as the top contributor to breaches.

The acquisition also strengthens Guardsquare’s global presence, enabling the company to meet customers where they are while further diversifying its reach across key industries such as financial services and healthcare. Furthermore, the move adds a new wave of dedicated engineers and security personnel from the XTD team, whose expertise will be instrumental in accelerating the evolution of the Guardsquare platform.

Guardsquare is committed to ensuring seamless continuity for existing XTD customers, with no disruption to current services, support, or product operations. Customers will continue to receive the same high standard of support they expect today as XTD technology becomes part of the Guardsquare platform. The company will also continue to work closely with the existing XTD partner ecosystem, as partners continue to sell and support customers as they do today.

For more information on the XTD technology, visit www.protectmyapp.com.

A design-forward Valentine’s Day gift that lasts beyond February From Samsung

Posted in Commentary with tags on February 5, 2026 by itnerd

As Valentine’s Day approaches, there’s growing interest in design-forward gifts that add lasting value to the home, rather than novelty items tied to a single moment. 

Samsung has few lifestyle-focused products that are a natural fit for Valentine’s Day gift guides centered on home, design, or everyday living , each standing on its own as a long-term upgrade. 

The Frame TV 

  • Designed to look like art when not in use, blending seamlessly into living spaces 
  • Access to the Samsung Art Store, allowing the screen to double as a rotating gallery 
  • A strong option for those who value design as much as technology 

Music Frame Speaker 

  • A picture-frame-inspired speaker that complements interior décor 
  • Delivers rich sound without the look of traditional audio equipment 
  • Works well in living rooms, bedrooms, or smaller spaces where aesthetics matter 

The Moving Style 

  • A movable, height-adjustable screen designed for flexibility around the home 
  • Easy to reposition between rooms, making it ideal for casual viewing, workouts, or shared spaces 
  • Combines portability with a clean, modern design 

Each one offers a more thoughtful alternative to traditional Valentine’s Day gifts, prioritizing design, everyday use, and longevity over seasonal novelty. 

You can find out more details at Samsung.ca

Cayosoft and XMS Solutions Selected by U.S. Department of War Agency to Modernize ICAM Operations for Mission Resilience

Posted in Commentary with tags , on February 5, 2026 by itnerd

 Cayosoft and XMS Solutions today announced they have been selected to support a Department of War agency modernization effort focused on strengthening Identity, Credential, Access, and Management (ICAM) capabilities in alignment with federal Zero Trust objectives. The effort supports Department of War priorities for improving identity security, operational resilience, and mission continuity across complex hybrid Microsoft environments, consistent with Executive Order 14028 and Zero Trust Architecture principles defined in NIST Special Publication 800-207.

As part of the initiative, the agency is modernizing legacy identity administration and recovery capabilities to reduce operational risk, improve visibility into identity activity, and strengthen its ability to respond to and recover from cyber incidents affecting directory services. Cayosoft and XMS Solutions were selected to deliver a standardized, scalable ICAM capability designed to support secure access, continuous monitoring, and resilient operations across on-premises and cloud environments.

The joint solution integrates Cayosoft’s commercial off-the-shelf identity management, security, and recovery platform with XMS Solutions’ federal implementation and operational expertise. Together, the team is delivering an ICAM capability that supports Zero Trust outcomes by enforcing least privilege, improving auditability, reducing reliance on custom scripting, and enabling rapid restoration of identity services required for mission execution.

The Cayosoft Enterprise Management Suite provides unified administration, continuous monitoring, policy enforcement, and recovery for hybrid Microsoft identity platforms. The solution supports audit readiness and operational resilience by enabling agencies to maintain trusted identity services before, during, and after cyber events—without introducing additional operational complexity.

SolarWinds Appears To Be Back From The Dead

Posted in Commentary with tags on February 5, 2026 by itnerd

The CISA has added to its KEV catalog and is giving federal agencies till Friday to patch the actively exploited, critical security (9.8) flaw reported last week in SolarWinds’ Web Help Desk software.

The bug involves an untrusted data deserialization weakness that allows a remote, unauthenticated attacker to execute arbitrary code on affected systems. 

Horizon3.ai researchers revealed that the recently identified SolarWinds vulnerability, tracked as CVE-2025-40551, stems from an earlier flaw uncovered in 2024 (CVE-2024-28986) and the new bug is part of an ongoing chain of issues caused by incomplete remediation of the original vulnerability, allowing attackers to bypass previous fixes. 

In response to the discovery, SolarWinds has released updates in its Web Help Desk 2026.1 release that address this and several related vulnerabilities, including several with high severity ratings, some of which can also bypass authentication controls or allow similar impacts such as privilege escalation or arbitrary actions by unauthenticated users. 

Vishal Agarwal, CEO, Averlon had this comment:

   “What stands out is not one critical CVE, but a series of six caused by incomplete fixes of the same underlying weakness. This incident shows how easy it is to patch the reported bug without eliminating the root problem. Engineers are moving fast, working at scale, and are not security specialists. The answer isn’t more expertise. It’s better reasoning that helps teams fix the system, not just the CVE.”

Damon Small, Board of Directors, Xcape, Inc. follows with this comment:

   “SolarWinds’ Web Help Desk has a critical remote code execution vulnerability (CVE-2025-40551) stemming from untrusted data deserialization, which is the same root cause as a flaw patched two years ago, discovered by the same researcher who found the original issue. CISA has added it to the Known Exploited Vulnerabilities catalog, confirming active exploitation and requiring immediate patching to version 2026.1.

   “While this is the only confirmed exploit currently, the January 2026 patch also addressed three other critical vulnerabilities, including authentication bypasses, that could be chained together for full system compromise. Organizations must patch immediately to avoid becoming the next breach headline.

   “When the same researcher finds the bypass to your two-year-old patch, that’s not a vulnerability; that’s a sequel nobody asked for.”

Lydia Zhang, President & Co-Founder,Ridge Security Technology Inc. adds this comment:

   “These CVEs are quite serious and involve Remote Code Execution (RCE) attacks caused by authentication bypass or improper data deserialization. “Help Desk” software is an obvious target and an easy entry point into an enterprise network, enabling attackers to cause further damage. Security teams should patch these vulnerabilities right away.”

I truly thought that we were done with the dumpster fire that was SolarWinds. But I guess like the bad guy who dies at the end of the movie only to come back in the sequel, nothing of this sort truly goes away.

Palo Alto Networks NextWave Program

Posted in Commentary with tags on February 5, 2026 by itnerd

Palo Alto Networks today announced the next generation of its NextWave Partner Program, fundamentally redefining partner profitability for the AI era. As the industry moves toward AI-driven security, NextWave moves beyond transactional volume to reward partners who deliver platform-centric security outcomes.

The evolved program enables the entire partner ecosystem to move away from the ‘point-product’ trap. By focusing on platformization, Palo Alto Networks enables partners to integrate their customers’ security stacks across the network, cloud, and SOC—reducing complexity while increasing high-margin, partner-led service opportunities.

Available to partners now, the new NextWave Partner Program is built on direct feedback from the global partner community, focusing on three transformative benefits:

  • Enhancing Partner Margins: Streamlined rebates focus on Next-Generation Firewalls (NGFW), Next-Generation Security (NGS) and platformization to reward technical expertise and maximize profitability.
  • Accelerating Deal Velocity: Enhanced Configure, Price, Quote (CPQ) and new automated deal registrations, combined with improved service delivery tools, to reduce friction and speed up time to close.
  • Reinvesting For Growth: A new Partner Development Fund (PDF) reinvests earned rebates directly into partner-led demand generation, training, and solution development to drive differentiation and accelerate joint customer success.

With Tailored Paths for Every Partner:

  • Managed Security Service Providers (MSSPs): Predictable, tiered pricing to build high-margin managed services to ensure accelerated outcomes.
  • Distributors: Enhanced capabilities, governance and support for Distributor Managed Partner growth.
  • Global System Integrators (GSIs): A “Global Path” rewarding multi-theater influence and strategic consulting with a white glove experience, coming later this year.
  • Authorized Services (ASC & APS): Real-time deployment assistance to ensure “first-time-right” customer implementations.

Comparitech Education Ransomware Roundup: 2025 stats on attacks, ransoms, and data breaches

Posted in Commentary with tags on February 5, 2026 by itnerd

Comparitech researchers have published a study looking at all the education ransomware attacks of 2025. 

In 2025, ransomware gangs took credit for 251 cyberattacks on schools, universities, and other educational institutions. While similar to 2024’s figure (247), 2025’s attacks resulted in the breach of over 3.96 million records, a significant increase from 2024 (3.11 million).

The three largest breaches of 2025 all stem from Clop’s exploit of a zero-day vulnerability in Oracle’s E-Business Suite software, highlighting how schools not only face the threat of ransomware attacks on their own systems but also on the third parties they rely on.

Key findings include: 

  • 3,962,869 records are known to have been breached in the confirmed attacks–UP 27% from 2024’s figure (3,112,121)
  • Average ransom demand across all attacks = $464,000–DOWN 33% from 2024 ($694,000)
  • The ransomware strains that claimed the most attacks against schools, colleges, and universities were Qilin (37), SafePay (23), Fog and Interlock (18 each), and INC (17)
  • Interlock took credit for the most confirmed attacks (11), followed by Qilin (9), Fog (7), SafePay, INC, and Clop (6 each), and Medusa (4)
  • Over 241 TB of data was allegedly stolen across all attacks
  • The United States saw the most attacks (130), followed by the United Kingdom (12), France, Brazil, and Japan (9 each), Canada (8), and Australia and Spain (7 each)
  • Attacks in the US (-9%), the UK (-50%), France (-18%), and Germany (-40%) all declined, while attacks in Brazil (+125%), Japan (+350%), Canada (+14%), Australia (+250%), and Spain (+600%) all increased

The report is here: https://www.comparitech.com/news/education-ransomware-roundup-2025-stats-on-attacks-ransoms-and-data-breaches/