As the world settles into the holiday spirit, the digital landscape remains as active as ever. Today’s brief highlights a critical mix of festive-themed fraud, major data exposure, and a significant milestone in quantum computing. While many offices are closing for the break, remember that threat actors do not take holidays.
Security researchers have identified two popular Chrome extensions that were modified to secretly harvest user credentials and session cookies. In building on yesterday’s Training Byte, which focused on mobile devices, remember that desktop browsers are likewise vulnerable; take a few minutes to navigate to chrome://extensions to audit your active add-ons; remove any you no longer use and disable those requesting excessive or outdated permissions.
An INTERPOL-coordinated crackdown spanning 19 countries has neutralized several prolific cybercrime organizations. The month-long investigation resulted in:
The Cl0p ransomware group has claimed responsibility for a massive breach affecting 3.5 million individuals at the University of Phoenix.
Vulnerability:
Real-time travel updates and location tagging expose physical security gaps, empty homes, and provide "proof of life" details that social engineers use to craft high-urgency scams targeting your family or colleagues.
Mitigation:
Wait until you have returned home to share vacation photos or "check-in" at locations. Keep your itinerary private and ensure your social media profiles are set to "Friends Only" to limit the audience of your personal data.
Learn about modern cryptography by solving a series of interactive puzzles and challenges. Get to know the ciphers and protocols that secure the digital world by breaking them. This starter course gets you up and running with CryptoHack. You'll learn to encode and decode data types that are commonly used in cryptography, master the XOR operation, and test your skills with complex puzzles.
📅 Self-Paced
💲 Free
Recent data reveals that over 35% of all breaches in 2024 originated through third-party vendors. The "Vendor Trust" model, where a partner is granted broad access because of a signed contract, is failing. In 2025, true Zero Trust means treating vendors as Non-Human Identities (NHIs) that require continuous, session-based validation rather than one-time static permissions.
Looking Ahead to 2026: As we prepare to ring in the new year, make it a priority to aggressively audit and prune unnecessary vendor visibility. Don't carry legacy "implicit trust" into 2026. Start the year by implementing strictly scoped, time-bound access for every external partner, ensuring that your organization’s data, and your customers' privacy, is no longer a passenger on someone else's security journey.
Google researchers have smashed a major bottleneck in quantum computing by reaching 99.99% fidelity in "magic states."