{"id":340,"date":"2026-01-31T08:00:00","date_gmt":"2026-01-31T16:00:00","guid":{"rendered":"https:\/\/hexagoncenter.org\/spotlight\/?p=340"},"modified":"2026-01-30T21:28:42","modified_gmt":"2026-01-31T05:28:42","slug":"this-week-in-hx-weekly-january-25-2026-to-february-1-2026","status":"publish","type":"post","link":"https:\/\/hexagoncenter.org\/spotlight\/this-week-in-hx-weekly-january-25-2026-to-february-1-2026\/","title":{"rendered":"This week in HX Weekly (January 25, 2026 to February 1, 2026)"},"content":{"rendered":"\n<p>This week\u2019s cybersecurity landscape has been defined by a sharp rise in automated supply-chain attacks and the exploitation of trusted developer environments.<\/p>\n\n\n\n<p>Most notably, the discovery of spyware within popular AI coding extensions on the VS Code Marketplace has exposed the &#8220;blueprints&#8221; of thousands of private software projects, while high-profile data breaches at Nike and Crunchbase continue to highlight the vulnerability of centralized corporate data. These events, coupled with the emergence of VoidLink\u2014one of the first malware strains largely architected by AI\u2014suggest that <strong><em>attackers are moving away from manual phishing and toward sophisticated, AI-driven methods to compromise infrastructure at scale.<\/em><\/strong><\/p>\n\n\n\n<p>In the world of cybersecurity, filing your taxes early is essentially a &#8220;race to the finish line&#8221; against identity thieves. Since the IRS only accepts one tax return per Social Security Number (SSN) each year, the first person to file &#8220;claims&#8221; that identity for the season.<br>Here is why filing early is one of the smartest defensive moves you can make:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">It Blocks &#8220;Tax Refund Fraud&#8221;<\/h2>\n\n\n\n<p>The most common tax-related cybercrime involves a hacker using a stolen SSN (likely from a past data breach) to file a fake return and pocket your refund.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The Trap: If a criminal files in February and you file in April, the IRS will reject your legitimate return as a &#8220;duplicate,&#8221; leaving you with a months-long bureaucratic nightmare to prove who you are.<\/li>\n\n\n\n<li>The Defense: By filing as soon as you have your W-2s and 1099s, you &#8220;lock&#8221; your SSN in the IRS system, making any subsequent fraudulent attempts an automatic failure.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">You Beat the &#8220;AI-Enhanced&#8221; Scams<\/h2>\n\n\n\n<p>In 2026, scammers are increasingly using AI-driven phishing and deepfakes to impersonate IRS agents or tax professionals. These scams typically spike in late March and April when panic sets in for procrastinators.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Reduced Stress = Better Security: When you aren&#8217;t rushing to meet a deadline, you are much less likely to fall for a &#8220;URGENT: IRS NOTICE&#8221; email or a fake text message designed to steal your credentials.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Protection Against &#8220;Mail Sniffing&#8221;<\/h2>\n\n\n\n<p>While digital threats are huge, physical security still matters. W-2s and tax documents sitting in your mailbox for weeks are prime targets for &#8220;mailbox fishing.&#8221;<\/p>\n\n\n\n<ol class=\"wp-block-list\"><\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Filing early forces you to gather and secure these documents immediately, reducing the window of time they are exposed to physical theft.<\/li>\n<\/ul>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Pro-Tip: The &#8220;Digital Lock&#8221;<br>Regardless of when you file, you should get an IRS Identity Protection PIN (IP PIN). This is a 6-digit code known only to you and the IRS. Even if a hacker has your SSN, they cannot file a return without this PIN. It is the closest thing to &#8220;Two-Factor Authentication&#8221; for your taxes.<\/p>\n<\/blockquote>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This week\u2019s cybersecurity landscape has been defined by a sharp rise in automated supply-chain attacks and the exploitation of trusted developer environments. Most notably, the discovery of spyware within popular AI coding extensions on the VS Code Marketplace has exposed the &#8220;blueprints&#8221; of thousands of private software projects, while high-profile data breaches at Nike and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-340","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>This week in HX Weekly (January 25, 2026 to February 1, 2026) - HX Spotlight Files<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hexagoncenter.org\/spotlight\/this-week-in-hx-weekly-january-25-2026-to-february-1-2026\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"This week in HX Weekly (January 25, 2026 to February 1, 2026) - HX Spotlight Files\" \/>\n<meta property=\"og:description\" content=\"This week\u2019s cybersecurity landscape has been defined by a sharp rise in automated supply-chain attacks and the exploitation of trusted developer environments. Most notably, the discovery of spyware within popular AI coding extensions on the VS Code Marketplace has exposed the &#8220;blueprints&#8221; of thousands of private software projects, while high-profile data breaches at Nike and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hexagoncenter.org\/spotlight\/this-week-in-hx-weekly-january-25-2026-to-february-1-2026\/\" \/>\n<meta property=\"og:site_name\" content=\"HX Spotlight Files\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-31T16:00:00+00:00\" \/>\n<meta name=\"author\" content=\"Editorial\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editorial\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/this-week-in-hx-weekly-january-25-2026-to-february-1-2026\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/this-week-in-hx-weekly-january-25-2026-to-february-1-2026\\\/\"},\"author\":{\"name\":\"Editorial\",\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/#\\\/schema\\\/person\\\/2f8219c99512366965821b725b05cbb8\"},\"headline\":\"This week in HX Weekly (January 25, 2026 to February 1, 2026)\",\"datePublished\":\"2026-01-31T16:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/this-week-in-hx-weekly-january-25-2026-to-february-1-2026\\\/\"},\"wordCount\":450,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/#organization\"},\"articleSection\":[\"Default\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/this-week-in-hx-weekly-january-25-2026-to-february-1-2026\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/this-week-in-hx-weekly-january-25-2026-to-february-1-2026\\\/\",\"url\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/this-week-in-hx-weekly-january-25-2026-to-february-1-2026\\\/\",\"name\":\"This week in HX Weekly (January 25, 2026 to February 1, 2026) - HX Spotlight Files\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/#website\"},\"datePublished\":\"2026-01-31T16:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/this-week-in-hx-weekly-january-25-2026-to-february-1-2026\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/this-week-in-hx-weekly-january-25-2026-to-february-1-2026\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/this-week-in-hx-weekly-january-25-2026-to-february-1-2026\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"This week in HX Weekly (January 25, 2026 to February 1, 2026)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/#website\",\"url\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/\",\"name\":\"HX Spotlight Files\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/#organization\",\"name\":\"HX Spotlight Files\",\"url\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/logo.webp\",\"contentUrl\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/logo.webp\",\"width\":338,\"height\":72,\"caption\":\"HX Spotlight Files\"},\"image\":{\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/#\\\/schema\\\/person\\\/2f8219c99512366965821b725b05cbb8\",\"name\":\"Editorial\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9314bba5e6586f27b7eb074fdb0b5601ac3c14d10a8e559210e60bb9d69b4f4f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9314bba5e6586f27b7eb074fdb0b5601ac3c14d10a8e559210e60bb9d69b4f4f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9314bba5e6586f27b7eb074fdb0b5601ac3c14d10a8e559210e60bb9d69b4f4f?s=96&d=mm&r=g\",\"caption\":\"Editorial\"},\"url\":\"https:\\\/\\\/hexagoncenter.org\\\/spotlight\\\/author\\\/ldsdaniel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"This week in HX Weekly (January 25, 2026 to February 1, 2026) - HX Spotlight Files","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hexagoncenter.org\/spotlight\/this-week-in-hx-weekly-january-25-2026-to-february-1-2026\/","og_locale":"en_US","og_type":"article","og_title":"This week in HX Weekly (January 25, 2026 to February 1, 2026) - HX Spotlight Files","og_description":"This week\u2019s cybersecurity landscape has been defined by a sharp rise in automated supply-chain attacks and the exploitation of trusted developer environments. Most notably, the discovery of spyware within popular AI coding extensions on the VS Code Marketplace has exposed the &#8220;blueprints&#8221; of thousands of private software projects, while high-profile data breaches at Nike and [&hellip;]","og_url":"https:\/\/hexagoncenter.org\/spotlight\/this-week-in-hx-weekly-january-25-2026-to-february-1-2026\/","og_site_name":"HX Spotlight Files","article_published_time":"2026-01-31T16:00:00+00:00","author":"Editorial","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Editorial","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hexagoncenter.org\/spotlight\/this-week-in-hx-weekly-january-25-2026-to-february-1-2026\/#article","isPartOf":{"@id":"https:\/\/hexagoncenter.org\/spotlight\/this-week-in-hx-weekly-january-25-2026-to-february-1-2026\/"},"author":{"name":"Editorial","@id":"https:\/\/hexagoncenter.org\/spotlight\/#\/schema\/person\/2f8219c99512366965821b725b05cbb8"},"headline":"This week in HX Weekly (January 25, 2026 to February 1, 2026)","datePublished":"2026-01-31T16:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/hexagoncenter.org\/spotlight\/this-week-in-hx-weekly-january-25-2026-to-february-1-2026\/"},"wordCount":450,"commentCount":0,"publisher":{"@id":"https:\/\/hexagoncenter.org\/spotlight\/#organization"},"articleSection":["Default"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/hexagoncenter.org\/spotlight\/this-week-in-hx-weekly-january-25-2026-to-february-1-2026\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/hexagoncenter.org\/spotlight\/this-week-in-hx-weekly-january-25-2026-to-february-1-2026\/","url":"https:\/\/hexagoncenter.org\/spotlight\/this-week-in-hx-weekly-january-25-2026-to-february-1-2026\/","name":"This week in HX Weekly (January 25, 2026 to February 1, 2026) - HX Spotlight Files","isPartOf":{"@id":"https:\/\/hexagoncenter.org\/spotlight\/#website"},"datePublished":"2026-01-31T16:00:00+00:00","breadcrumb":{"@id":"https:\/\/hexagoncenter.org\/spotlight\/this-week-in-hx-weekly-january-25-2026-to-february-1-2026\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hexagoncenter.org\/spotlight\/this-week-in-hx-weekly-january-25-2026-to-february-1-2026\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/hexagoncenter.org\/spotlight\/this-week-in-hx-weekly-january-25-2026-to-february-1-2026\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/hexagoncenter.org\/spotlight\/"},{"@type":"ListItem","position":2,"name":"This week in HX Weekly (January 25, 2026 to February 1, 2026)"}]},{"@type":"WebSite","@id":"https:\/\/hexagoncenter.org\/spotlight\/#website","url":"https:\/\/hexagoncenter.org\/spotlight\/","name":"HX Spotlight Files","description":"","publisher":{"@id":"https:\/\/hexagoncenter.org\/spotlight\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hexagoncenter.org\/spotlight\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/hexagoncenter.org\/spotlight\/#organization","name":"HX Spotlight Files","url":"https:\/\/hexagoncenter.org\/spotlight\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hexagoncenter.org\/spotlight\/#\/schema\/logo\/image\/","url":"https:\/\/hexagoncenter.org\/spotlight\/wp-content\/uploads\/2023\/04\/logo.webp","contentUrl":"https:\/\/hexagoncenter.org\/spotlight\/wp-content\/uploads\/2023\/04\/logo.webp","width":338,"height":72,"caption":"HX Spotlight Files"},"image":{"@id":"https:\/\/hexagoncenter.org\/spotlight\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hexagoncenter.org\/spotlight\/#\/schema\/person\/2f8219c99512366965821b725b05cbb8","name":"Editorial","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9314bba5e6586f27b7eb074fdb0b5601ac3c14d10a8e559210e60bb9d69b4f4f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9314bba5e6586f27b7eb074fdb0b5601ac3c14d10a8e559210e60bb9d69b4f4f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9314bba5e6586f27b7eb074fdb0b5601ac3c14d10a8e559210e60bb9d69b4f4f?s=96&d=mm&r=g","caption":"Editorial"},"url":"https:\/\/hexagoncenter.org\/spotlight\/author\/ldsdaniel\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/posts\/340","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/comments?post=340"}],"version-history":[{"count":2,"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/posts\/340\/revisions"}],"predecessor-version":[{"id":343,"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/posts\/340\/revisions\/343"}],"wp:attachment":[{"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/media?parent=340"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/categories?post=340"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hexagoncenter.org\/spotlight\/wp-json\/wp\/v2\/tags?post=340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}