Five major incidents in January alone — supply-chain vectors, vishing gangs, and 149 million exposed credentials signal a structural shift in how attackers operate.
Sara Voss
·
January 29, 2026
·
8 min read
January 2026’s breach wave isn’t about sophisticated zero-days — it’s about attackers weaponising trusted third-party integrations and human psychology (vishing) to bypass every technical control you’ve deployed. Supply-chain hygiene and employee voice-phishing training are now non-negotiable.
2M Crunchbase records
149M credentials exposed
5 major incidents Jan 2026
10M Match Group records
1M govt + healthcare victims
- Audit third-party integrations: List every vendor with API/DB access to your systems. Revoke what you don’t actively use.
- Run vishing simulations: Add voice-phishing scenarios to security awareness training — not just email phishing.
- Patch SharePoint immediately: CVE-2026-20963 has active exploits in the wild. This is not optional.
- Check HaveIBeenPwned: The 149M credential DB is being indexed. Enforce password resets for any matches.
- Require call-back verification: For any voice request to change account access, require a second factor via a pre-registered callback number.
- Limit vendor blast radius: Scope third-party data access to the minimum needed — if AppsFlyer doesn’t need raw PII, don’t send raw PII.
Networkcraft delivers cybersecurity intelligence every week — no noise, no filler, just what matters to practitioners.