Google released an urgent Chrome security update to patch a high-severity zero-day vulnerability that hackers are actively exploiting in the wild. The emergency fix brings Chrome to version 143.0.7499.109/.110 for Windows/Mac and 143.0.7499.109 for Linux.
Google confirmed threat actors are leveraging this flaw (tracked as Issue 466192044) to compromise unpatched systems. The company is keeping technical details restricted to prevent other hackers from reverse-engineering the patch.
The update also fixes two medium-severity bugs in Chrome's Password Manager and Toolbar. Users should update immediately through Chrome's Help menu to protect against targeted attacks.
Source: Cybersecurity News
Google released an urgent Chrome security update to patch a high-severity zero-day vulnerability that hackers are actively exploiting in the wild. The emergency fix brings Chrome to version 143.0.7499.109/.110 for Windows/Mac and 143.0.7499.109 for Linux.
Google confirmed threat actors are leveraging this flaw (tracked as Issue 466192044) to compromise unpatched systems. The company is keeping technical details restricted to prevent other hackers from reverse-engineering the patch.
The update also fixes two medium-severity bugs in Chrome's Password Manager and Toolbar. Users should update immediately through Chrome's Help menu to protect against targeted attacks.
Source: Cybersecurity News
The Justice Department charged Victoria Eduardovna Dubranova, 33, a Ukrainian national, with cyberattacks on critical US infrastructure as part of two Russian state-sponsored hacking groups. Working with CyberArmyofRussia_Reborn (CARR) and NoName057(16), she allegedly targeted water systems, food processing facilities, and government networks across the US and allied nations.
The attacks caused real damage: drinking water systems in several states spilled hundreds of thousands of gallons, and a November 2024 attack on a Los Angeles meat plant spoiled thousands of pounds of meat and triggered an ammonia leak evacuation.
Dubranova faces up to 27 years if convicted on all charges. The State Department is offering rewards up to $10 million for information on the groups.
Source: CyberScoop
The Justice Department charged Victoria Eduardovna Dubranova, 33, a Ukrainian national, with cyberattacks on critical US infrastructure as part of two Russian state-sponsored hacking groups. Working with CyberArmyofRussia_Reborn (CARR) and NoName057(16), she allegedly targeted water systems, food processing facilities, and government networks across the US and allied nations.
The attacks caused real damage: drinking water systems in several states spilled hundreds of thousands of gallons, and a November 2024 attack on a Los Angeles meat plant spoiled thousands of pounds of meat and triggered an ammonia leak evacuation.
Dubranova faces up to 27 years if convicted on all charges. The State Department is offering rewards up to $10 million for information on the groups.
Source: CyberScoop
Microsoft released patches for 57 vulnerabilities this month, including one zero-day bug that attackers are already exploiting. CVE-2025-62221 affects Windows Cloud Files Mini Filter Driver and lets attackers escalate privileges to system-level access once they're inside a network.
Two other flaws have public proof-of-concept exploits available: a PowerShell remote code execution bug and a GitHub Copilot vulnerability affecting JetBrains tools. Security experts say the Copilot flaw could let attackers use AI prompt injections to access development environments.
This December update is much lighter than earlier releases—Microsoft patched over 1,150 vulnerabilities in 2025, making it one of their busiest years ever.
Source: Dark Reading
Microsoft released patches for 57 vulnerabilities this month, including one zero-day bug that attackers are already exploiting. CVE-2025-62221 affects Windows Cloud Files Mini Filter Driver and lets attackers escalate privileges to system-level access once they're inside a network.
Two other flaws have public proof-of-concept exploits available: a PowerShell remote code execution bug and a GitHub Copilot vulnerability affecting JetBrains tools. Security experts say the Copilot flaw could let attackers use AI prompt injections to access development environments.
This December update is much lighter than earlier releases—Microsoft patched over 1,150 vulnerabilities in 2025, making it one of their busiest years ever.
Source: Dark Reading
Royal Cornwall Hospitals NHS Trust accidentally leaked personal details of 8,100 current and former employees through a botched Freedom of Information request response. The trust mistakenly shared an editable spreadsheet containing staff names, job titles, and detailed sick leave records spanning April 2020 to May 2023.
No patient data or financial information was compromised, but the breach exposed sensitive employment details that could embarrass or harm affected workers. The trust quickly removed the file, suspended its disclosure log, and reported the incident to the Information Commissioner's Office.
New safeguards now disable spreadsheet editing before any public releases. The ICO reviewed the case and decided no further action was needed.
Source: BBC News
Royal Cornwall Hospitals NHS Trust accidentally leaked personal details of 8,100 current and former employees through a botched Freedom of Information request response. The trust mistakenly shared an editable spreadsheet containing staff names, job titles, and detailed sick leave records spanning April 2020 to May 2023.
No patient data or financial information was compromised, but the breach exposed sensitive employment details that could embarrass or harm affected workers. The trust quickly removed the file, suspended its disclosure log, and reported the incident to the Information Commissioner's Office.
New safeguards now disable spreadsheet editing before any public releases. The ICO reviewed the case and decided no further action was needed.
Source: BBC News
Manufacturing companies are struggling against a rising ransomware threat, with a new Sophos report revealing alarming vulnerabilities across the sector. Based on 332 IT leaders' experiences, the study found exploited vulnerabilities caused 32% of attacks, while malicious emails accounted for 23%.
A critical skills shortage emerged as the top factor, with 42.5% of victims citing lack of expertise as a key vulnerability. Unknown security gaps and inadequate protection followed closely at 41.6% and 41% respectively.
The human toll is severe. Nearly half of IT teams reported increased anxiety about future attacks, while 27% saw leadership replaced after breaches. One in five teams experienced staff absenteeism due to stress.
There's hope: only 40% of attacks now result in data encryption, down from 74% in 2024, suggesting improved defenses are working.
Source: Industrial Cyber
Manufacturing companies are struggling against a rising ransomware threat, with a new Sophos report revealing alarming vulnerabilities across the sector. Based on 332 IT leaders' experiences, the study found exploited vulnerabilities caused 32% of attacks, while malicious emails accounted for 23%.
A critical skills shortage emerged as the top factor, with 42.5% of victims citing lack of expertise as a key vulnerability. Unknown security gaps and inadequate protection followed closely at 41.6% and 41% respectively.
The human toll is severe. Nearly half of IT teams reported increased anxiety about future attacks, while 27% saw leadership replaced after breaches. One in five teams experienced staff absenteeism due to stress.
There's hope: only 40% of attacks now result in data encryption, down from 74% in 2024, suggesting improved defenses are working.
Source: Industrial Cyber
A critical React vulnerability dubbed React2Shell (CVE-2025-55182) is facing massive exploitation just days after its December 3rd disclosure. The maximum severity flaw earned a perfect 10 CVSS score and enables remote code execution in React applications.
China-linked threat groups began attacking within hours, but exploitation has now exploded across the threat landscape. Security firm Wiz documented attacks ranging from cryptomining to sophisticated backdoor campaigns targeting Next.js applications and Kubernetes environments. VulnCheck reported hundreds of exploit attempts by December 6th.
Over 2.1 million exposed web services run vulnerable frameworks, with the US leading exposure counts. While web application firewalls offer some protection, researchers warn bypass techniques exist. Organizations must prioritize patching over temporary mitigations.
Source: Dark Reading
A critical React vulnerability dubbed React2Shell (CVE-2025-55182) is facing massive exploitation just days after its December 3rd disclosure. The maximum severity flaw earned a perfect 10 CVSS score and enables remote code execution in React applications.
China-linked threat groups began attacking within hours, but exploitation has now exploded across the threat landscape. Security firm Wiz documented attacks ranging from cryptomining to sophisticated backdoor campaigns targeting Next.js applications and Kubernetes environments. VulnCheck reported hundreds of exploit attempts by December 6th.
Over 2.1 million exposed web services run vulnerable frameworks, with the US leading exposure counts. While web application firewalls offer some protection, researchers warn bypass techniques exist. Organizations must prioritize patching over temporary mitigations.
Source: Dark Reading
Chinese hackers gained remote access to several U.S. Treasury Department workstations and unclassified documents by compromising BeyondTrust, a third-party software provider. The Treasury discovered the breach on December 8 when hackers stole a security key used for remote technical support services.
The department called it a "major cybersecurity incident" but said there's no evidence the hackers still have access. China denied involvement, with officials calling the allegations "groundless" and an attempt to "smear" their reputation.
This breach adds to ongoing concerns about Chinese cyber espionage, including the Salt Typhoon campaign that affected nine U.S. telecommunications companies and intercepted Americans' private communications.
Source: CBS News
Chinese hackers gained remote access to several U.S. Treasury Department workstations and unclassified documents by compromising BeyondTrust, a third-party software provider. The Treasury discovered the breach on December 8 when hackers stole a security key used for remote technical support services.
The department called it a "major cybersecurity incident" but said there's no evidence the hackers still have access. China denied involvement, with officials calling the allegations "groundless" and an attempt to "smear" their reputation.
This breach adds to ongoing concerns about Chinese cyber espionage, including the Salt Typhoon campaign that affected nine U.S. telecommunications companies and intercepted Americans' private communications.
Source: CBS News
Ransomware payments fell sharply in 2024, dropping 33% from $1.1 billion to $734 million, according to a new Treasury Department report. The Financial Crimes Enforcement Network study offers cautious hope after ransomware payments skyrocketed 77% in 2023.
However, the number of attacks barely budged—1,476 incidents in 2024 versus 1,512 in 2023. Manufacturing bore the heaviest burden with 456 attacks and $285 million in payments, followed by financial services (432 incidents, $366 million) and healthcare (389 attacks, $305 million).
Officials identified 267 ransomware variants over three years, with ALPHV/BlackCat leading the pack. While the payment decline is encouraging, experts warn it's too early to declare victory over ransomware.
Source: CyberScoop
Ransomware payments fell sharply in 2024, dropping 33% from $1.1 billion to $734 million, according to a new Treasury Department report. The Financial Crimes Enforcement Network study offers cautious hope after ransomware payments skyrocketed 77% in 2023.
However, the number of attacks barely budged—1,476 incidents in 2024 versus 1,512 in 2023. Manufacturing bore the heaviest burden with 456 attacks and $285 million in payments, followed by financial services (432 incidents, $366 million) and healthcare (389 attacks, $305 million).
Officials identified 267 ransomware variants over three years, with ALPHV/BlackCat leading the pack. While the payment decline is encouraging, experts warn it's too early to declare victory over ransomware.
Source: CyberScoop
Cybersecurity researcher Mazin Ahmed discovered that attackers are exploiting VS Code and AI-powered IDEs like Cursor AI by publishing malicious extensions that bypass security screening. A fake Python linter called "Piithon-linter" successfully made it through Microsoft's marketplace security checks and could steal developer credentials and deploy remote access tools.
The malware activates automatically when VS Code launches, first checking for antivirus software before harvesting sensitive environment variables. It uses geofencing to avoid detection during Microsoft's sandbox testing and can target Windows, macOS, or Linux systems.
Most concerning is that OpenVSX marketplace, which powers Cursor AI, performs virtually no security verification. Since developers have access to source code, credentials, and production systems, these compromised extensions could lead to major supply chain attacks targeting entire organizations.
Source: Cybersecurity News
Cybersecurity researcher Mazin Ahmed discovered that attackers are exploiting VS Code and AI-powered IDEs like Cursor AI by publishing malicious extensions that bypass security screening. A fake Python linter called "Piithon-linter" successfully made it through Microsoft's marketplace security checks and could steal developer credentials and deploy remote access tools.
The malware activates automatically when VS Code launches, first checking for antivirus software before harvesting sensitive environment variables. It uses geofencing to avoid detection during Microsoft's sandbox testing and can target Windows, macOS, or Linux systems.
Most concerning is that OpenVSX marketplace, which powers Cursor AI, performs virtually no security verification. Since developers have access to source code, credentials, and production systems, these compromised extensions could lead to major supply chain attacks targeting entire organizations.
Source: Cybersecurity News
AT&T customers have until December 18 to claim their share of a $177 million settlement from two major data breaches. The 2019 breach exposed Social Security numbers and personal data of 73 million customers, while the 2024 Snowflake hack affected phone records of 109 million users.
Customers who can prove documented losses may receive up to $5,000 for the 2019 breach or $2,500 for the 2024 incident. Those without proof of loss will receive smaller tiered payments. You need a Class Member ID from Kroll's email notification to file your claim.
If you can't find the notification, check spam folders or call 833-890-4930. Customers affected by both breaches can file separate claims for each incident.
Source: CNET
AT&T customers have until December 18 to claim their share of a $177 million settlement from two major data breaches. The 2019 breach exposed Social Security numbers and personal data of 73 million customers, while the 2024 Snowflake hack affected phone records of 109 million users.
Customers who can prove documented losses may receive up to $5,000 for the 2019 breach or $2,500 for the 2024 incident. Those without proof of loss will receive smaller tiered payments. You need a Class Member ID from Kroll's email notification to file your claim.
If you can't find the notification, check spam folders or call 833-890-4930. Customers affected by both breaches can file separate claims for each incident.
Source: CNET