IT Security Newsletter

IT Security Newsletter - 12/10/2025

Written by Cadre | Wed, Dec 10, 2025

Microsoft Patch Tuesday, December 2025 Edition

Microsoft today pushed updates to fix at least 56 security flaws in its Windows operating systems and supported software. This final Patch Tuesday of 2025 tackles one zero-day bug that is already being exploited, as well as two publicly disclosed vulnerabilities. Despite releasing a lower-than-normal number of security updates these past few months, Microsoft patched a whopping 1,129 vulnerabilities in 2025, an 11.9% increase from 2024. READ MORE...

US Indicts Extradited Ukrainian on Charges of Aiding Russian Hacking Groups

A Ukrainian woman was charged in the US in two separate indictments for her alleged ties with two hacktivist groups known for launching hundreds of cyberattacks in support of the Russian government's interests. The individual, Victoria Eduardovna Dubranova, 33, allegedly played a role in cyberattacks and intrusions that pro-Russia hacktivist groups CyberArmyofRussia_Reborn (CARR) and NoName057(16) (NoName) carried out against critical infrastructure organizations worldwide. READ MORE...

Spain arrests teen who stole 64 million personal data records

The National Police in Spain have arrested a suspected 19-year-old hacker in Barcelona, for allegedly stealing and attempting to sell 64 million records obtained from breaches at nine companies. The teen now faces charges related to involvement in cybercrime, unauthorized access and disclosure of private data, and privacy violations. "The cybercriminal accessed nine different companies where he obtained millions of private records that he later sold online," reads the police's announcement. READ MORE...

ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Rockwell, Schneider

Industrial giants Siemens, Rockwell Automation, Schneider Electric, and Phoenix Contact have published Patch Tuesday advisories informing customers about vulnerabilities found in their ICS/OT products. Siemens has published 14 new advisories. An overall severity rating of 'critical' has been assigned to three advisories covering dozens of third-party component vulnerabilities affecting Comos, Sicam T, and Ruggedcom ROX products. READ MORE...

Japanese Firms Suffer Long Tail of Ransomware Damage

More than two months after ransomware shutdown its operations, Japanese food and beverage giant Asahi Holdings continues to suffer from back-office disruptions and was recently forced to acknowledge the possibility of a data breach affecting 1.9 million people. The company is not alone among Japanese firms. Japanese online retailer Askul announced this week that it would resume taking orders from its corporate clients more than six weeks after the firm acknowledged an attack. READ MORE...

New Spiderman phishing service targets dozens of European banks

A new phishing kit called Spiderman is targeting customers of numerous European banks and cryptocurrency services using pixel-perfect replicas of legitimate sites. The platform allows cybercriminals to launch phishing campaigns that can capture login credentials, two-factor authentication (2FA) codes, and credit card data. The Spiderman phishing kit, analyzed by researchers at Varonis, targets financial institutions in five countries. READ MORE...

Analysts Warn of Cybersecurity Risks in Humanoid Robots

A quiet economic subsector is emerging around humanoid robots, and it's already experiencing a variety of cybersecurity challenges. In case large language models (LLMs) don't wipe out enough jobs, organizations in the US and Asia are currently working toward replacing manual laborers too, with machines that look and move like people but won't demand wages. Humanoid robots are inevitably going to get cheaper to manufacture over time. READ MORE...

LLMs are everywhere in your stack and every layer brings new risk

LLMs are moving deeper into enterprise products and workflows, and that shift is creating new pressure on security leaders. A new guide from DryRun Security outlines how these systems change long standing assumptions about data handling, application behavior, and internal boundaries. It is built around the OWASP Top 10 for LLM Applications, which the company uses as the structure for a full risk model and a reference architecture for teams building with LLMs. READ MORE...

  • ...in 1815, mathematician and writer Ada Lovelace, regarded by many as the world's first computer programmer, is born in Nottingham, England.
  • ...in 1884, Mark Twain's satirical novel "Adventures of Huckleberry Finn" is first published.
  • ...in 1901, the first Nobel Prize ceremony is held in Stockholm, Sweden, on the fifth anniversary of founder Alfred Nobel's death.
  • ...in 1978, Richard Donner's "Superman" starring Christopher Reeve, Margot Kidder, and Gene Hackman premieres at the Kennedy Center.