Print to PDF: Ctrl+P → Destination: Save as PDF → Margins: None → Background graphics: On

#CyberWeekly
WEEK 7 · FEB 6 - FEB 12, 2026
Friday the 13th: Patch Tuesday Edition
Microsoft fixes 6 actively exploited zero-days — just in time for the unluckiest day of the year
Platform: Wiki-Centric Compliance Engine
Ransomware Surges 49% — SMEs Pay the Price
First Malicious Outlook Add-In in the Wild
Easy Cyber Protection
#CyberWeekly · Week 7
1/5

Microsoft's Friday the 13th: 6 zero-days patched just before the unluckiest day of the year

Jason's got nothing on Microsoft's February Patch Tuesday.

The lineup of horrors: If you haven't patched yet, this is your final warning. Unlike the movies, these exploits don't need a sequel — they're already in production. Check your patch management process, prioritize these six CVEs, and get your clients protected. The only acceptable body count this Friday is zero.

Full Patch Tuesday breakdown from BleepingComputer → https://www.bleepingcomputer.com/news/microsoft/microsoft-february-2026-patch-tuesday-fixes-6-zero-days-58-flaws/

#CyberWeekly · Week 7
2/5

Platform Spotlight: The wiki-centric compliance engine is here

Turning wiki pages into audit-ready documentation just got stupid simple.

Try it now → https://easycyberprotection.com/start

#CyberWeekly · Week 7
3/5

Ransomware surges 49% — and two-thirds of victims are SMEs

The ransomware business is booming, and SMEs are paying the price — literally.

Two-thirds of victims are SMEs with under 500 employees, confirming what we already suspected: small businesses are the new gold rush. Why? Weaker defenses, slower patching, and limited security teams make them low-hanging fruit for Ransomware-as-a-Service operators hunting fast payouts. Belgium alone has 130 victims listed on leak sites — a...

Read the full BlackFog report → https://www.blackfog.com/the-state-of-ransomware-2026/

#CyberWeekly · Week 7
4/5

First malicious Outlook add-in found in the wild — 4,000 credentials stolen

Someone finally weaponized the Outlook add-in ecosystem.

The attack vector is clever and worrying: attackers didn't need to compromise Microsoft or bypass security controls. They just waited for a domain to expire, registered it, and inherited the trust relationship with existing Outlook installations. Users saw a familiar add-in name, entered their credentials on what looked like a legitimate...

#CyberWeekly · Week 7
5/5

University of Hawaii Cancer Center hit by ransomware — research data exposed

Ransomware just disrupted cancer research, and the damage goes beyond data.

Healthcare and research institutions remain high-value targets because they combine sensitive data with operational urgency. Attackers know hospitals and universities can't afford extended downtime, making them more likely to pay ransoms. The Cancer Center breach shows the cascading impact: lost research time, exposed patient data, disrupted...

Read the full issue
5 stories. Context that matters.
Belgian cybersecurity, weekly.
Scan to read online
https://easycyberprotection.com/cyberweekly/2026/week-7
Follow #CyberWeekly
easycyberprotection.com