{"id":338,"date":"2026-01-24T08:00:00","date_gmt":"2026-01-24T16:00:00","guid":{"rendered":"https:\/\/hexagoncenter.org\/spotlight\/?p=338"},"modified":"2026-01-23T22:13:23","modified_gmt":"2026-01-24T06:13:23","slug":"this-week-in-hx-weekly-january-18-2026-to-january-24-2026","status":"publish","type":"post","link":"https:\/\/hexagoncenter.org\/spotlight\/this-week-in-hx-weekly-january-18-2026-to-january-24-2026\/","title":{"rendered":"This week in HX Weekly (January 18, 2026 to January 24, 2026)"},"content":{"rendered":"\n<p>It has been an intense week in cybersecurity, marked by critical software vulnerabilities, major network disruptions, and a shift in how ransomware groups operate.<br>Here are the top headlines for the week of January 19, 2026:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Critical Vulnerabilities &amp; Patches<\/strong><\/h2>\n\n\n\n<p>Microsoft &#8220;Zero-Day&#8221; Active Exploitation: Security teams are scrambling to patch a vulnerability in the Windows Desktop Window Manager.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Major Infrastructure Incidents<\/h2>\n\n\n\n<p>Cloudflare BGP Route Leak: On January 22, a Miami data center caused a significant &#8220;route leak,\u201d causing widespread latency and connectivity issues across the internet.<\/p>\n\n\n\n<p>Microsoft Disrupts &#8220;RedVDS&#8221;: In a win for defenders, Microsoft and legal partners in the US and UK seized the infrastructure of RedVDS, a &#8220;cybercrime-as-a-service&#8221; platform. The service allowed low-level criminals to rent phishing tools for as little as $24\/month, leading to over $40 million in losses since 2025.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Data Breaches &amp; New Tactics<\/h2>\n\n\n\n<p>Insider Threat Surge: Reports this week highlighted a disturbing trend: ransomware groups are now recruiting corporate insiders via gig-economy platforms (like Upwork or Fiverr). In one case, a &#8220;gig worker&#8221; was paid to physically enter an office and plug in a USB drive under the guise of a routine IT task.<\/p>\n\n\n\n<p>Minnesota DHS Breach: The Minnesota Department of Human Services reported that over 300,000 individuals were affected after an authorized user at a licensed healthcare provider inappropriately accessed private data in the MnCHOICES system.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Industry Trends<\/h2>\n\n\n\n<p>AI &#8220;Shadow Agents&#8221;: The World Economic Forum&#8217;s 2026 Outlook notes that 94% of leaders see AI as the primary driver of cyber risk this year. The focus is shifting from simple ransomware to &#8220;cyber-enabled fraud&#8221; and the risk of &#8220;Shadow AI Agents&#8221;\u2014unauthorized AI tools running within corporate networks.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>The World Economic Forum (WEF) in Davos (January 19\u201323, 2026) has been heavily focused on how Artificial Intelligence is fundamentally rewriting the cybersecurity playbook. Leaders this week shifted the conversation from &#8220;defending networks&#8221; to &#8220;managing systemic trust.&#8221;<\/strong>\u00a0<\/p>\n<\/blockquote>\n\n\n\n<p>The World Economic Forum (WEF) in Davos (January 19\u201323, 2026) has been heavily focused on how Artificial Intelligence is fundamentally rewriting the cybersecurity playbook. Leaders this week shifted the conversation from &#8220;defending networks&#8221; to &#8220;managing systemic trust.&#8221;<br>Here are the key takeaways and reports released from Davos:<br><\/p>\n\n\n\n<p>The AI &#8220;Arms Race&#8221;<br>The WEF&#8217;s Global Cybersecurity Outlook 2026 report was the center of discussion. Its most striking findings include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The 94% Consensus: Nearly all executives (94%) agree that AI will be the primary driver of cybersecurity change this year.<\/li>\n\n\n\n<li>Offense vs. Defense: AI is &#8220;scaling plausibility,&#8221; making phishing and social engineering nearly impossible for humans to detect. However, defense is catching up; 64% of organizations now routinely audit their AI tools for security, nearly doubling from 37% in 2025.<\/li>\n\n\n\n<li>Shadow AI Agents: A major theme was the rise of &#8220;agentic AI&#8221;\u2014autonomous tools that can perform tasks on behalf of employees. Experts warned these &#8220;Shadow Agents&#8221; create massive holes in traditional security perimeters.<br><\/li>\n\n\n\n<li><strong>The &#8220;Confidence Gap&#8221; in Preparedness<\/strong><br>Despite advancements, there is a growing sense of vulnerability at the national level:<\/li>\n\n\n\n<li>Eroding Trust: Confidence in national cyber preparedness has dropped, with 31% of leaders reporting low confidence in their country\u2019s ability to respond to a major incident (up from 26% last year).<\/li>\n\n\n\n<li>Cyber Inequity: Discussion panels highlighted a widening &#8220;technological divide&#8221; between well-funded global corporations and small-to-medium enterprises (SMEs) that cannot afford the high-end AI defenses needed to block automated attacks.<\/li>\n\n\n\n<li><strong>CEO Shift: From Ransomware to Fraud<\/strong><br>While technical teams (CISOs) remain focused on ransomware, CEOs at Davos reported a shift in their top fear: Cyber-enabled fraud.<\/li>\n\n\n\n<li>The use of deepfakes and synthetic identities to bypass financial controls is now seen as a greater threat to the bottom line than traditional data encryption.<\/li>\n\n\n\n<li>Geopolitical Fractures: 64% of organizations now explicitly factor geopolitically motivated attacks (espionage and infrastructure disruption) into their risk mitigation strategies, a direct reflection of ongoing global tensions.<\/li>\n\n\n\n<li><strong>The &#8220;Zero Trust for Agents&#8221; Proposal<\/strong><br>One of the most actionable discussions involved treating AI agents not as &#8220;software,&#8221; but as &#8220;digital employees.&#8221; Leaders proposed a framework where AI agents must follow the same &#8220;Least Privilege&#8221; access rules as human staff to prevent them from being tricked into leaking sensitive data.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>It has been an intense week in cybersecurity, marked by critical software vulnerabilities, major network disruptions, and a shift in how ransomware groups operate.Here are the top headlines for the week of January 19, 2026: Critical Vulnerabilities &amp; Patches Microsoft &#8220;Zero-Day&#8221; Active Exploitation: Security teams are scrambling to patch a vulnerability in the Windows Desktop [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-338","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>This week in HX Weekly (January 18, 2026 to January 24, 2026) - HX Spotlight Files<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hexagoncenter.org\/spotlight\/this-week-in-hx-weekly-january-18-2026-to-january-24-2026\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"This week in HX Weekly (January 18, 2026 to January 24, 2026) - HX Spotlight Files\" \/>\n<meta property=\"og:description\" content=\"It has been an intense week in cybersecurity, marked by critical software vulnerabilities, major network disruptions, and a shift in how ransomware groups operate.Here are the top headlines for the week of January 19, 2026: Critical Vulnerabilities &amp; Patches Microsoft &#8220;Zero-Day&#8221; Active Exploitation: Security teams are scrambling to patch a vulnerability in the Windows Desktop [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hexagoncenter.org\/spotlight\/this-week-in-hx-weekly-january-18-2026-to-january-24-2026\/\" \/>\n<meta property=\"og:site_name\" content=\"HX Spotlight Files\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-24T16:00:00+00:00\" \/>\n<meta name=\"author\" content=\"Editorial\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editorial\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/this-week-in-hx-weekly-january-18-2026-to-january-24-2026\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/this-week-in-hx-weekly-january-18-2026-to-january-24-2026\\\/\"},\"author\":{\"name\":\"Editorial\",\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/#\\\/schema\\\/person\\\/2f8219c99512366965821b725b05cbb8\"},\"headline\":\"This week in HX Weekly (January 18, 2026 to January 24, 2026)\",\"datePublished\":\"2026-01-24T16:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/this-week-in-hx-weekly-january-18-2026-to-january-24-2026\\\/\"},\"wordCount\":671,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/#organization\"},\"articleSection\":[\"Default\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/this-week-in-hx-weekly-january-18-2026-to-january-24-2026\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/this-week-in-hx-weekly-january-18-2026-to-january-24-2026\\\/\",\"url\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/this-week-in-hx-weekly-january-18-2026-to-january-24-2026\\\/\",\"name\":\"This week in HX Weekly (January 18, 2026 to January 24, 2026) - HX Spotlight Files\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/#website\"},\"datePublished\":\"2026-01-24T16:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/this-week-in-hx-weekly-january-18-2026-to-january-24-2026\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/this-week-in-hx-weekly-january-18-2026-to-january-24-2026\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/this-week-in-hx-weekly-january-18-2026-to-january-24-2026\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"This week in HX Weekly (January 18, 2026 to January 24, 2026)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/#website\",\"url\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/\",\"name\":\"HX Spotlight Files\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/#organization\",\"name\":\"HX Spotlight Files\",\"url\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/logo.webp\",\"contentUrl\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/logo.webp\",\"width\":338,\"height\":72,\"caption\":\"HX Spotlight Files\"},\"image\":{\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/#\\\/schema\\\/person\\\/2f8219c99512366965821b725b05cbb8\",\"name\":\"Editorial\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9314bba5e6586f27b7eb074fdb0b5601ac3c14d10a8e559210e60bb9d69b4f4f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9314bba5e6586f27b7eb074fdb0b5601ac3c14d10a8e559210e60bb9d69b4f4f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9314bba5e6586f27b7eb074fdb0b5601ac3c14d10a8e559210e60bb9d69b4f4f?s=96&d=mm&r=g\",\"caption\":\"Editorial\"},\"url\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/author\\\/ldsdaniel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"This week in HX Weekly (January 18, 2026 to January 24, 2026) - HX Spotlight Files","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hexagoncenter.org\/spotlight\/this-week-in-hx-weekly-january-18-2026-to-january-24-2026\/","og_locale":"en_US","og_type":"article","og_title":"This week in HX Weekly (January 18, 2026 to January 24, 2026) - HX Spotlight Files","og_description":"It has been an intense week in cybersecurity, marked by critical software vulnerabilities, major network disruptions, and a shift in how ransomware groups operate.Here are the top headlines for the week of January 19, 2026: Critical Vulnerabilities &amp; Patches Microsoft &#8220;Zero-Day&#8221; Active Exploitation: Security teams are scrambling to patch a vulnerability in the Windows Desktop [&hellip;]","og_url":"https:\/\/hexagoncenter.org\/spotlight\/this-week-in-hx-weekly-january-18-2026-to-january-24-2026\/","og_site_name":"HX Spotlight Files","article_published_time":"2026-01-24T16:00:00+00:00","author":"Editorial","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Editorial","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hexagoncenter.org\/spotlight\/this-week-in-hx-weekly-january-18-2026-to-january-24-2026\/#article","isPartOf":{"@id":"https:\/\/hexagoncenter.org\/spotlight\/this-week-in-hx-weekly-january-18-2026-to-january-24-2026\/"},"author":{"name":"Editorial","@id":"https:\/\/hexagoncenter.org\/spotlight\/#\/schema\/person\/2f8219c99512366965821b725b05cbb8"},"headline":"This week in HX Weekly (January 18, 2026 to January 24, 2026)","datePublished":"2026-01-24T16:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/hexagoncenter.org\/spotlight\/this-week-in-hx-weekly-january-18-2026-to-january-24-2026\/"},"wordCount":671,"commentCount":0,"publisher":{"@id":"https:\/\/hexagoncenter.org\/spotlight\/#organization"},"articleSection":["Default"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/hexagoncenter.org\/spotlight\/this-week-in-hx-weekly-january-18-2026-to-january-24-2026\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/hexagoncenter.org\/spotlight\/this-week-in-hx-weekly-january-18-2026-to-january-24-2026\/","url":"https:\/\/hexagoncenter.org\/spotlight\/this-week-in-hx-weekly-january-18-2026-to-january-24-2026\/","name":"This week in HX Weekly (January 18, 2026 to January 24, 2026) - HX Spotlight Files","isPartOf":{"@id":"https:\/\/hexagoncenter.org\/spotlight\/#website"},"datePublished":"2026-01-24T16:00:00+00:00","breadcrumb":{"@id":"https:\/\/hexagoncenter.org\/spotlight\/this-week-in-hx-weekly-january-18-2026-to-january-24-2026\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hexagoncenter.org\/spotlight\/this-week-in-hx-weekly-january-18-2026-to-january-24-2026\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/hexagoncenter.org\/spotlight\/this-week-in-hx-weekly-january-18-2026-to-january-24-2026\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/hexagoncenter.org\/spotlight\/"},{"@type":"ListItem","position":2,"name":"This week in HX Weekly (January 18, 2026 to January 24, 2026)"}]},{"@type":"WebSite","@id":"https:\/\/hexagoncenter.org\/spotlight\/#website","url":"https:\/\/hexagoncenter.org\/spotlight\/","name":"HX Spotlight Files","description":"","publisher":{"@id":"https:\/\/hexagoncenter.org\/spotlight\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hexagoncenter.org\/spotlight\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/hexagoncenter.org\/spotlight\/#organization","name":"HX Spotlight Files","url":"https:\/\/hexagoncenter.org\/spotlight\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hexagoncenter.org\/spotlight\/#\/schema\/logo\/image\/","url":"https:\/\/hexagoncenter.org\/spotlight\/wp-content\/uploads\/2023\/04\/logo.webp","contentUrl":"https:\/\/hexagoncenter.org\/spotlight\/wp-content\/uploads\/2023\/04\/logo.webp","width":338,"height":72,"caption":"HX Spotlight Files"},"image":{"@id":"https:\/\/hexagoncenter.org\/spotlight\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hexagoncenter.org\/spotlight\/#\/schema\/person\/2f8219c99512366965821b725b05cbb8","name":"Editorial","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9314bba5e6586f27b7eb074fdb0b5601ac3c14d10a8e559210e60bb9d69b4f4f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9314bba5e6586f27b7eb074fdb0b5601ac3c14d10a8e559210e60bb9d69b4f4f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9314bba5e6586f27b7eb074fdb0b5601ac3c14d10a8e559210e60bb9d69b4f4f?s=96&d=mm&r=g","caption":"Editorial"},"url":"https:\/\/hexagoncenter.org\/spotlight\/author\/ldsdaniel\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/posts\/338","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/comments?post=338"}],"version-history":[{"count":1,"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/posts\/338\/revisions"}],"predecessor-version":[{"id":339,"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/posts\/338\/revisions\/339"}],"wp:attachment":[{"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/media?parent=338"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/categories?post=338"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/tags?post=338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}