Skip to article
Security Alert
Emergent Story mode

Now reading

Overview

1 / 5 3 min 5 sources Multi-Source
Sources

Story mode

Security AlertMulti-SourceBlindspot: Thin source bench

Cybersecurity Threats Mount as Data Breaches, Ransomware, and Vulnerabilities Target Users and Institutions Worldwide

A series of recent cybersecurity incidents has exposed the vulnerabilities of various systems and platforms, from a data breach at publishing platform Substack to a ransomware attack on an Italian university, highlighting the growing threat of cyberattacks on individuals and institutions.

Read
3 min
Sources
5 sources
Domains
2

The past week has seen a surge in cybersecurity threats, with a range of incidents affecting users and institutions worldwide. From a data breach at publishing platform Substack to a ransomware attack on an Italian...

Story state
Structured developing story
Evidence
Evidence mapped
Coverage
0 reporting sections
Next focus
What comes next

Continue in the field

Focused storyNearby context

Open the live map from this story.

Carry this article into the map as a focused origin point, then widen into nearby reporting.

Leave the article stream and continue in live map mode with this story pinned as your origin point.

  • Open the map already centered on this story.
  • See what nearby reporting is clustering around the same geography.
  • Jump back to the article whenever you want the original thread.
Open live map mode

Source bench

Blindspot: Thin source bench

Multi-Source

5 cited references across 2 linked domains.

References
5
Domains
2

5 cited references across 2 linked domains. Blindspot watch: Thin source bench.

  1. Source 1 · Fulqrum Sources

    Substack data breach leaks users’ email addresses and phone numbers

  2. Source 2 · Fulqrum Sources

    Ransomware gang uses ISPsystem VMs for stealthy payload delivery

Open source workbench

Keep reporting

ContradictionsEvent arcNarrative drift

Open the deeper evidence boards.

Take the mobile reel into contradictions, event arcs, narrative drift, and the full source workspace.

  • Scan the cited sources and coverage bench first.
  • Keep a blindspot watch on Thin source bench.
  • Move from the summary into the full evidence boards.
Open evidence boards

Stay in the reporting trail

Open the evidence boards, source bench, and related analysis.

Jump from the app-style read into the deeper workbench without losing your place in the story.

Open source workbenchBack to Security Alert
🔒 Security Alert

Cybersecurity Threats Mount as Data Breaches, Ransomware, and Vulnerabilities Target Users and Institutions Worldwide

A series of recent cybersecurity incidents has exposed the vulnerabilities of various systems and platforms, from a data breach at publishing platform Substack to a ransomware attack on an Italian university, highlighting the growing threat of cyberattacks on individuals and institutions.

Thursday, February 5, 2026 • 3 min read • 5 source references

  • 3 min read
  • 5 source references

The past week has seen a surge in cybersecurity threats, with a range of incidents affecting users and institutions worldwide. From a data breach at publishing platform Substack to a ransomware attack on an Italian university, the increasing frequency and sophistication of cyberattacks have raised concerns about the security of sensitive information and the resilience of critical infrastructure.

One of the most significant incidents was the data breach at Substack, a popular platform used by academics, journalists, and subject matter experts. According to an email sent to affected users, the breach occurred in October 2025 and resulted in the exposure of user email addresses, phone numbers, and other internal metadata. The company has since fixed the vulnerability and is conducting a full investigation into the incident.

Meanwhile, a ransomware gang has been using virtual machines (VMs) provisioned by ISPsystem, a legitimate virtual infrastructure management provider, to deliver malicious payloads. Researchers at cybersecurity company Sophos observed the tactic while investigating recent 'WantToCry' ransomware incidents and found that the attackers used Windows VMs with identical hostnames, suggesting default templates generated by ISPsystem's VMmanager.

In another incident, Italian university La Sapienza was targeted by a cyberattack that impacted its IT systems and caused widespread operational disruptions. The university first disclosed the incident in a social media post, stating that its IT infrastructure "has been the target of a cyberattack." As a precautionary measure, the university shut down its network systems and formed a technical task force to initiate remediation and restoration procedures.

The incidents highlight the growing threat of cyberattacks on institutions and individuals, particularly in the education sector. According to a report by cybersecurity company Huntress, attackers are increasingly exploiting legitimate but vulnerable Windows kernel drivers to shut down endpoint security tools. In one recent incident, attackers used an old EnCase forensic driver to terminate Endpoint Detection and Response (EDR) processes from kernel mode.

The exploitation of vulnerabilities in legitimate software and infrastructure is a growing concern, as seen in the case of ISPsystem's VMmanager. The company's software is used by hosting providers to manage virtual servers, and the abuse of its VMs by ransomware operators highlights the need for greater vigilance in securing critical infrastructure.

In related news, Microsoft has announced plans to shut down Exchange Online EWS in April 2027, after nearly 20 years. The Exchange Web Services (EWS) API has been used by developers to access Exchange mailbox items, and its shutdown is likely to impact organizations that rely on the service. Administrators will need to prepare for the transition by configuring alternative solutions and updating their systems to ensure continued access to critical functionality.

As the frequency and sophistication of cyberattacks continue to grow, individuals and institutions must remain vigilant in protecting their sensitive information and critical infrastructure. By staying informed about the latest threats and vulnerabilities, and by taking proactive steps to secure their systems, users can reduce the risk of falling victim to cyberattacks.

Sources:

  • Substack data breach leaks users’ email addresses and phone numbers
  • Ransomware gang uses ISPsystem VMs for stealthy payload delivery
  • Microsoft to shut down Exchange Online EWS in April 2027
  • Italian university La Sapienza goes offline after cyberattack
  • Attackers exploit decade‑old Windows driver flaw to shut down modern EDR defenses

The past week has seen a surge in cybersecurity threats, with a range of incidents affecting users and institutions worldwide. From a data breach at publishing platform Substack to a ransomware attack on an Italian university, the increasing frequency and sophistication of cyberattacks have raised concerns about the security of sensitive information and the resilience of critical infrastructure.

One of the most significant incidents was the data breach at Substack, a popular platform used by academics, journalists, and subject matter experts. According to an email sent to affected users, the breach occurred in October 2025 and resulted in the exposure of user email addresses, phone numbers, and other internal metadata. The company has since fixed the vulnerability and is conducting a full investigation into the incident.

Meanwhile, a ransomware gang has been using virtual machines (VMs) provisioned by ISPsystem, a legitimate virtual infrastructure management provider, to deliver malicious payloads. Researchers at cybersecurity company Sophos observed the tactic while investigating recent 'WantToCry' ransomware incidents and found that the attackers used Windows VMs with identical hostnames, suggesting default templates generated by ISPsystem's VMmanager.

In another incident, Italian university La Sapienza was targeted by a cyberattack that impacted its IT systems and caused widespread operational disruptions. The university first disclosed the incident in a social media post, stating that its IT infrastructure "has been the target of a cyberattack." As a precautionary measure, the university shut down its network systems and formed a technical task force to initiate remediation and restoration procedures.

The incidents highlight the growing threat of cyberattacks on institutions and individuals, particularly in the education sector. According to a report by cybersecurity company Huntress, attackers are increasingly exploiting legitimate but vulnerable Windows kernel drivers to shut down endpoint security tools. In one recent incident, attackers used an old EnCase forensic driver to terminate Endpoint Detection and Response (EDR) processes from kernel mode.

The exploitation of vulnerabilities in legitimate software and infrastructure is a growing concern, as seen in the case of ISPsystem's VMmanager. The company's software is used by hosting providers to manage virtual servers, and the abuse of its VMs by ransomware operators highlights the need for greater vigilance in securing critical infrastructure.

In related news, Microsoft has announced plans to shut down Exchange Online EWS in April 2027, after nearly 20 years. The Exchange Web Services (EWS) API has been used by developers to access Exchange mailbox items, and its shutdown is likely to impact organizations that rely on the service. Administrators will need to prepare for the transition by configuring alternative solutions and updating their systems to ensure continued access to critical functionality.

As the frequency and sophistication of cyberattacks continue to grow, individuals and institutions must remain vigilant in protecting their sensitive information and critical infrastructure. By staying informed about the latest threats and vulnerabilities, and by taking proactive steps to secure their systems, users can reduce the risk of falling victim to cyberattacks.

Sources:

  • Substack data breach leaks users’ email addresses and phone numbers
  • Ransomware gang uses ISPsystem VMs for stealthy payload delivery
  • Microsoft to shut down Exchange Online EWS in April 2027
  • Italian university La Sapienza goes offline after cyberattack
  • Attackers exploit decade‑old Windows driver flaw to shut down modern EDR defenses

Coverage tools

Sources, context, and related analysis

Visual reasoning

How this briefing, its evidence bench, and the next verification path fit together

A server-rendered QWIKR board that keeps the article legible while showing the logic of the current read, the attached source bench, and the next high-value reporting move.

Cited sources

0

Reasoning nodes

3

Routed paths

2

Next checks

1

Reasoning map

From briefing to evidence to next verification move

SSR · qwikr-flow

Story geography

Where this reporting sits on the map

Use the map-native view to understand what is happening near this story and what adjacent reporting is clustering around the same geography.

Geo context
0.00° N · 0.00° E Mapped story

This story is geotagged, but the nearby reporting bench is still warming up.

Continue in live map mode

Coverage at a Glance

5 sources

Compare coverage, inspect perspective spread, and open primary references side by side.

Linked Sources

5

Distinct Outlets

2

Viewpoint Center

Not enough mapped outlets

Outlet Diversity

Very Narrow
0 sources with viewpoint mapping 0 higher-credibility sources
Coverage is still narrow. Treat this as an early map and cross-check additional primary reporting.

Coverage Gaps to Watch

  • Thin mapped perspectives

    Most sources do not have mapped perspective data yet, so viewpoint spread is still uncertain.

  • No high-credibility anchors

    No source in this set reaches the high-credibility threshold. Cross-check with stronger primary reporting.

Read Across More Angles

Source-by-Source View

Search by outlet or domain, then filter by credibility, viewpoint mapping, or the most-cited lane.

Showing 5 of 5 cited sources with links.

Unmapped Perspective (5)

bleepingcomputer.com

Ransomware gang uses ISPsystem VMs for stealthy payload delivery

Open

bleepingcomputer.com

Unmapped bias Credibility unknown Dossier
bleepingcomputer.com

Microsoft to shut down Exchange Online EWS in April 2027

Open

bleepingcomputer.com

Unmapped bias Credibility unknown Dossier
bleepingcomputer.com

Italian university La Sapienza goes offline after cyberattack

Open

bleepingcomputer.com

Unmapped bias Credibility unknown Dossier
csoonline.com

Substack data breach leaks users’ email addresses and phone numbers

Open

csoonline.com

Unmapped bias Credibility unknown Dossier
csoonline.com

Attackers exploit decade‑old Windows driver flaw to shut down modern EDR defenses

Open

csoonline.com

Unmapped bias Credibility unknown Dossier
Fact-checked Real-time synthesis Bias-reduced

This article was synthesized by Fulqrum AI from 5 trusted sources, combining multiple perspectives into a comprehensive summary. All source references are listed below.