Latest Internet & Cybersecurity News

📅December 19, 2025 at 1:00 AM
Mid‑December sees major exploits of email/security appliances, rising credential‑stuffing campaigns, DPRK crypto thefts, ransomware against energy, and regulatory pushes worldwide.
1

Cisco confirms active exploitation of Secure Email Gateway and Secure Email and Web Manager

Cisco acknowledged active exploitation of vulnerabilities in its Secure Email Gateway and Secure Email and Web Manager, urging immediate mitigations after observed attacks targeting those appliancesSource 1. Cisco’s advisory prompted broad incident-response activity across affected organizations and featured in H‑ISAC daily headlines highlighting it as a leading storySource 1.

2

Surge in credential‑based attacks targeting Palo Alto GlobalProtect and Cisco SSL VPNs

Researchers observed a coordinated surge of automated brute‑force login attempts against Palo Alto Networks GlobalProtect and Cisco SSL VPN portals, with millions of sessions and thousands of unique attacking IPs detected over mid‑DecemberSource 5. GreyNoise linked the activity to centralized cloud hosting and noted shared tooling between the Palo Alto and Cisco campaignSource 5.

3

Chainalysis: North Korea‑linked groups stole $2.02B in crypto during 2025

Chainalysis reported DPRK‑linked threat actors, including the Lazarus Group, were responsible for approximately $2.02 billion in cryptocurrency thefts in 2025, a sharp year‑over‑year increase and the largest share of global crypto theftsSource 6. The report ties those operations to high‑profile exchange breaches and ongoing state‑backed financial cybercrime campaignsSource 6.

4

Ransomware disrupts PDVSA administrative systems, halts oil loading at terminals

A ransomware attack against PDVSA’s administrative systems forced pauses in oil loading at key terminals such as the Jose crude terminal, according to maritime cybersecurity reportingSource 4. The incident underscores growing risk to energy supply chains from cyber incidents impacting operational or administrative controlsSource 4.

5

Gladinet CentreStack and Triofox vulnerabilities actively exploited

Security bulletins and ISAC reporting flagged active exploitation of vulnerabilities in Gladinet CentreStack and Triofox file‑sharing products, with threat actors leveraging those flaws for unauthorized access or data theftSource 1. H‑ISAC included these exploits among notable vulnerabilities observed in December briefingsSource 1.

6

Oracle/Cerner supply‑chain breach concerns persist for hospitals and healthcare providers

Healthcare sector reporting notes continuing fallout and incomplete impact assessment from an Oracle/Cerner related breach that may affect many hospitals, with estimates of millions potentially impacted and ongoing investigationsSource 7Source 1. Experts warn that vendor compromises like Change Healthcare earlier in 2025 demonstrate how a single third‑party breach can cascade across providersSource 7.

7

Parked domains increasingly deliver malware, scams and phishing (research finding)

New research cited by ISAC reporting found that about 90% of parked domains now host or redirect to malware, scams, or phishing pages, raising risks for defensive domain management and brand protection teamsSource 1. The trend increases exposure from routine domain scans and innocuous linksSource 1.

8

Gladinet/Triofox and Microsoft IIS/MSMQ issues prompt urgent admin action

Reports indicate Microsoft engaged administrators to address failures and issues related to Windows IIS and MSMQ services while vendors and ISACs urged immediate remediation for affected productsSource 1. The combination of platform service problems and exploited third‑party products magnifies operational cyber risk for enterprisesSource 1.

9

Regulatory and standards momentum after a pivotal 2025: NIS2, DORA, CIRCIA and AI risk focus

Analyses of 2025 policy activity show enforcement of EU NIS2 and DORA, U.S. moves like CIRCIA rapid reporting requirements, and evolving NIST/AI RMF guidance—driving international alignment and increased compliance burden for critical entitiesSource 3. Experts expect 2026 emphasis on AI governance, provenance, and harmonization across jurisdictionsSource 3.

10

Credential‑stuffing and automated campaigns exploit gaps in MFA adoption and VPN security

Multiple reports highlight that many attacks rely on credential stuffing and opportunistic automated login attempts rather than zero‑day exploits, revealing persistent weaknesses where MFA is absent or misconfiguredSource 5Source 1. Industry commentary notes traditional MFA approaches can introduce operational friction, complicating defenses while attackers refine social‑engineering and AI‑assisted phishing tacticsSource 1Source 5.