Cybersecurity Roundup, February 2026

February 26, 2026 | Cybersecurity
Chloe Schofield

Written by
Chloe Schofield

From global sporting events to public sector organisations and major tech platforms, February’s incidents reinforce a consistent message: attackers are opportunistic, persistent and increasingly sophisticated. Read more in this February cybersecurity roundup.

Cyber-attacks in the news

Adidas investigates third-party data breach

Adidas confirmed it is investigating a potential data protection incident involving one of its independent licensing partners, after criminals claimed they had accessed information linked to the sportswear giant.

According to reports, attackers alleged they obtained more than 800,000 rows of data, including names, email addresses and other details. Adidas stated there is currently no indication that its own IT infrastructure, e-commerce platforms or consumer data were affected, emphasising that the breach happened within a partner’s systems.

The incident follows a similar third-party security event last year, reinforcing the persistent risks to do with supplier ecosystems. Although this case seems limited to data exposure at a partner organisation, supply chain incidents can provide attackers with a pathway into core networks and customer environments.

As Ian Groves of Start Tech commented on LinkedIn:
“A supplier was [breached]. Adidas just get the headline.

815,000 rows of customer data gone from a third party they trusted.

Your supply chain is part of your attack surface.”

This case serves as a timely reminder that third-party risk management is not just a compliance exercise. Supplier due diligence, contractual security requirements, access controls and continuous monitoring are essential to lessening exposure across the wider system.

Winter Olympics 2026: preparing for cyber threats

At the recent 2026 Winter Olympics, organisers in Milan and Cortina had to ramp up their cybersecurity measures due to warnings about large-scale sporting events remaining prime targets.

Security teams reportedly deployed AI-driven monitoring, stress-testing and incident simulations to combat disruptions. The focus was on maintaining service availability under pressure.

Substack confirms user data breach

Newsletter platform Substack has disclosed a breach affecting user email addresses and phone numbers after unauthorised access to the system.

Although passwords were reportedly not compromised, exposed contact details can increase the risk of phishing and impersonation attacks, especially with Substack’s high-profile publisher and subscriber base.

This incident highlights the risks digital platforms face and the importance of limiting stored personal data, strengthening internal access controls and continuous monitoring for suspicious activity.

Developments in Northern Ireland police data breach

Two years on, the Police Service in Northern Ireland continues to manage the consequences of its reported data exposure. The service has more recently confirmed that some of the officers who had their names published in a data breach in 2023 have now had their names published on the NI Courts website.

Investigations and support measures remain in place, and the breach has reinforced concerns around data governance, secure handling procedures and the human factor in cybersecurity incidents. It has been reported that the Department of Justice (DoJ) took instant action and removed the online public court list as a precautionary measure.

For public sector organisations especially, this event displays how procedural weaknesses, not just technical flaws, can result in significant operational and personal risk even years after the initial breach.

The cybersecurity landscape

Government campaign urges businesses to strengthen basics

The UK government has launched a new campaign encouraging businesses to “lock the door” on cyber criminals by implementing straightforward controls such as multi-factor authentication, regular patching and secure backups.

The campaign targets SMEs where simple, low-cost measures can significantly reduce exposure to everyday threats such as phishing and ransomware.

NCSC research on external attack surface management

The National Cyber Security Centre (NCSC) is seeking industry input to support the next phase of its external attack surface management (EASM) research.

The initiative echoes growing concern around internet-facing assets that organisations may not realise are exposed. Proactively identifying and reducing digital footprint is becoming a central component of modern cyber resilience strategies.

Cyber Security Longitudinal Survey findings

The latest UK Cyber Security Longitudinal Survey suggests that while awareness of cyber threats remains high, gaps persist in incident response planning, supply chain oversight and formal employee training.

Board-level engagement is improving, and adoption of baseline standards is increasing. However smaller organisations continue facing challenges in taking awareness into consistent, measurable controls.

Threat landscape snapshot

Global events remain huge operational cyber targets

Events such as the Winter Olympics demonstrate how large operations that depend on technology create wide attack surfaces and attract those seeking disruption, visibility and reputational damage.

Public sector systems keep attracting attackers

Breaches involving police forces and government bodies emphasise how employee data and different internal systems can become valuable entry points.

A foundation of cyber hygiene still plays a big role in reducing risk

Government campaigns and survey findings continue to show that actions such as multi-factor authentication, updates, backups and staff awareness significantly reduce exposure.

At Brigantia, we support channel partners in protecting their clients with our selected vendor portfolio, specialists and dedicated support. As regulatory expectations and threat tactics evolve, we help our partners strengthen their security plans in a way that works for them.

To read more articles like this, head to our news and articles page. To explore our cybersecurity vendors or discuss how we can support your security offering, visit our vendor page or get in touch with the Brigantia team.

Recommended reading

Protect access to all areas with Privileged Access Management

Recently, we hosted a partner webinar focused on one of the most critical (and fast‑evolving) areas of ...

What you need to know about the new Government Cyber Action Plan

At the start of January 2026, the Government published their Government Cyber Action Plan. In the paper’s ...

Building an inclusive tech industry: Lessons in leadership, allyship and change

For the last year, I have served as Vice Chair of the Advancing Women in Technology Interest Group within ...