CyberSense Newsletter Icon
December 24, 2025

Daily Digital Awareness Brief

Silent Trust, Loud Consequences

As the world settles into the holiday spirit, the digital landscape remains as active as ever. Today’s brief highlights a critical mix of festive-themed fraud, major data exposure, and a significant milestone in quantum computing. While many offices are closing for the break, remember that threat actors do not take holidays.

Situational Awareness

Chrome Extensions Stealing Credentials

The Hacker News

Security researchers have identified two popular Chrome extensions that were modified to secretly harvest user credentials and session cookies. In building on yesterday’s Training Byte, which focused on mobile devices, remember that desktop browsers are likewise vulnerable; take a few minutes to navigate to chrome://extensions to audit your active add-ons; remove any you no longer use and disable those requesting excessive or outdated permissions.


Operation Sentinel Busts Syndicates

Dark Reading

An INTERPOL-coordinated crackdown spanning 19 countries has neutralized several prolific cybercrime organizations. The month-long investigation resulted in:

  • 574 suspects arrested and approximately $3 million in assets seized
  • 6,000+ malicious links taken down and 6 distinct ransomware variants decrypted
  • $21 million in losses linked to cases involving BEC and digital extortion

University of Phoenix Data Breach

Security Week

The Cl0p ransomware group has claimed responsibility for a massive breach affecting 3.5 million individuals at the University of Phoenix.

  • The Connection: Threat actors exploited a zero-day vulnerability in the university's Oracle E-Business Suite (EBS) instance (specifically CVE-2025-61882)
  • The Scope: This is part of a global campaign targeting Oracle EBS environments. By gaining unauthenticated remote access to the financial application environment, Cl0p was able to exfiltrate names, SSNs, and banking details. Similar attacks have recently impacted Harvard and the University of Pennsylvania.

Training Byte

Social Post Pause

Vulnerability:

Real-time travel updates and location tagging expose physical security gaps, empty homes, and provide "proof of life" details that social engineers use to craft high-urgency scams targeting your family or colleagues.

Mitigation:

Wait until you have returned home to share vacation photos or "check-in" at locations. Keep your itinerary private and ensure your social media profiles are set to "Friends Only" to limit the audience of your personal data.

Career Development

CryptoHack

Learn about modern cryptography by solving a series of interactive puzzles and challenges. Get to know the ciphers and protocols that secure the digital world by breaking them. This starter course gets you up and running with CryptoHack. You'll learn to encode and decode data types that are commonly used in cryptography, master the XOR operation, and test your skills with complex puzzles.

📅 Self-Paced

💲 Free

Modernization and AI Insight

Zero Trust vs. Vendor Trust

Cybersecurity Intelligence

Recent data reveals that over 35% of all breaches in 2024 originated through third-party vendors. The "Vendor Trust" model, where a partner is granted broad access because of a signed contract, is failing. In 2025, true Zero Trust means treating vendors as Non-Human Identities (NHIs) that require continuous, session-based validation rather than one-time static permissions.

Looking Ahead to 2026: As we prepare to ring in the new year, make it a priority to aggressively audit and prune unnecessary vendor visibility. Don't carry legacy "implicit trust" into 2026. Start the year by implementing strictly scoped, time-bound access for every external partner, ensuring that your organization’s data, and your customers' privacy, is no longer a passenger on someone else's security journey.


Google Achieves 99.99% Fidelity on Quantum Processor

Quantum Zeitgeist

Google researchers have smashed a major bottleneck in quantum computing by reaching 99.99% fidelity in "magic states."

  • What it is: Magic states are the "quantum fuel" needed to perform complex gates (non-Clifford gates) that classical computers can't simulate
  • Why it matters: Previously, creating these states required massive "distillation factories" that wasted up to 99% of qubits. Google’s new cultivation technique reduces error by 40x while retaining 8% of attempts, drastically lowering the number of physical qubits needed to build a useful, fault-tolerant quantum computer.