This Week In Cybersecurity | February 13th, 2026

This week in cybersecurity feb 13 2026

Automated investment platform Betterment experienced a data breach last month that compromised 1.4 million accounts. 

In January, hackers gained access to the company’s systems and obtained personal information associated with the accounts. The stolen information includes names, contact information, physical addresses, device information, employers’ locations, and job titles. While the attackers had system access, they sent fake company promotion emails to customers. 

Thankfully, investigations into the incident found that no customer account login information was compromised, and accounts remain secure.  

(–Source: Bleeping Computer
Read More: Data breach at fintech firm Betterment exposes 1.4 million accounts ) 

 

 

In October 2025, Substack’s systems experienced unauthorized access that compromised user data. 

While highly sensitive data such as financial information and passwords was unaffected by this incident, email addresses, phone numbers, and other unspecified “internal metadata” was accessed by the unauthorized third party.  

The issue that allowed for the unauthorized access has now been fixed, and the incident is being investigated. There is currently no indication of how many users have been affected. 

(–Source: TechCrunch on MSN
Read More: Substack confirms data breach affects users’ email addresses and phone numbers ) 

 

 

Photo sharing platform Flickr has disclosed news of a data breach in an email to its users.  

The incident stemmed from “a vulnerability in a system operated by one of [Flickr’s] email service providers” and may have allowed unauthorized access to the platform’s user information. Compromised information may include name, contact information, Flickr activity and username, IP address, general location, and, potentially, passwords and payment information “depending on your account.”  

Flickr acted quickly and was able to disable the affected system, remove links to the vulnerable endpoint, and launch an investigation within just a few hours of the issue being identified. Investigation is currently ongoing.  

(–Source: Forbes
Read More:  Photo-Sharing Platform Flickr Issues Data Breach Warning ) 

 

 

The recent data breach on Conduent has affected Volvo customers and employees, exposing the data of around 17,000 individuals. This notification of Volvo’s systems being involved came over 6 months after Conduent initially discovered the infiltration of its network.  

Volvo has not yet disclosed what type of information was compromised, but data stolen from Conduent includes names, SSNs, medical and health information, indicating that the nature of Volvo’s stolen data may be similar.  

(–Source: TechRadar on Yahoo! News
Read More: Thousands of Volvo customers possibly affected in major data breach – 17,000 affected, here’s what we know ) 

 

 

Despite hackers stealing 70,000 government ID information from Discord users in October of 2025, Discord has now announced that all users will be required to verify their age via video selfie or government ID uploads in order to access adult content. Those who do not verify their age by these methods, will have their accounts defaulted to “teen-appropriate” settings. The platform is, unsurprisingly, facing backlash from its users about this decision. 

Many Discord users are concerned about the privacy of their data since this change is being rolled out in early March, just months after age verification data was already stolen from the platform.  

(–Source: Ars Technica
Read More: Discord faces backlash over age checks after data breach exposed 70,000 IDs – Ars Technica ) 

The Resource Hub

Get Complete Managed Services Insights

Visit our Resource Center for up-to-date news and stories for technology and business leaders.

SIEM
General

What Is SIEM and How Does It Work?

What Is SIEM and How Does It Work? At some point, many IT teams realize they are spending more time sorting through alerts than actually

co managed IT
Managed Services

Co-Managed IT for Compliance-Heavy Industries

Co-Managed IT for Compliance-Heavy Industries Most IT leaders in compliance-heavy industries don’t worry about whether technology works; they worry about whether it can stand up to scrutiny. 

Three IT Service Techs Working together at desks in office

Move Forward with IT Services for Business

Use managed services for small and mid-sized businesses that help you reach your goals.

Work With Us
AT Horizontal Logo

Is Your Business Prepared to Face the Latest Cyberthreats?

Take Our FREE Security Assessment

Better understand your organization’s security posture and discover if your business is a good candidate for managed or co-managed IT services.

Security Assessment Popup Graphic
Get In Touch