
Loading summary
A
From the CISO series, it's Cybersecurity Headlines.
B
These are the cybersecurity headlines for Thursday, December 11, 2025. I'm Sarah Lane.
CEO of retail giant Coupang Resigns South Korea's Coupang CEO Park Dae Joon stepped down after a breach exposed data from around 34 million customers. The company said he resigned out of responsibility for the incident discovered. On November 18, Coupang named Chief Administrative Officer Harold Rogers interim CEO with a focus on stabilizing operations and reassuring users. South Korean authorities are investigating, including a raid on Coupang's headquarters and a probe involving a former employee from China.
Pro Russia hacktivists target US Infrastructure US Officials say Pro Russia hacktivist groups are breaking into poorly secured VNC connections tied to US Critical infrastructure, mainly water, food and energy Systems. The groups Car Z Pen Test, no Name 05716 and Sector 16 are are using brute forced VNC access to reach HMI devices, capture screens, alter settings, disable alarms and cause limited physical disruption. CISA warns the activity is unsophisticated but could become more dangerous as tactics evolve, and the DOJ has charged a Ukrainian national linked to car and no name 05716 Israeli cybersecurity funding Hits Records Israeli cybersecurity startups pulled in a record $4.4 billion this year. That is, according to YL Ventures. That's a 9% jump from 2024, with 130 total rounds, up from 89. AI security and endpoint Security saw the strongest momentum, and major players like Armis, Cato Networks, Sierra Dream and Island announced big raises. YL Ventures says the ecosystem has expanded more than 500% over the past decade. Aeroflot hacked through Techvendor, Russia's flagship airline. Aeroflot had a difficult summer after pro Ukrainian hackers Silent Crow and the Belarusian cyber partisans breached it through a small contractor called Bakasoft, according to a new investigation from the Bell. The groups allegedly maintained long term access, moved into Aeroflot's active directory, grabbed high privilege accounts and deployed dozens of malware tools. The outage grounded more than 100 flights and caused tens of millions of dollars in damages. Investigators say that Aeroflot lacked two factor authentication on key servers and let the vendor keep remote access.
Huge thanks to our sponsor, Adaptive Security. This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. In deepfake scams, the tells aren't just glitchy video anymore, it's behavior. Do this right now or keep it secret. If you hear urgency and secrecy together, stop and verify through a second channel, call a known number, start a chat thread, or ask something only the real person would know. Adaptive trains teams against exactly these tactics. Learn more@adaptivesecurity.com.
Fortinet fixes authentication bypass vulnerabilities Fortinet released patches for 18 vulnerabilities, including two critical authentication bypass bugs in Fort OS, Forta Web, FortiProxy and FortiSwitch Manager. When FortiCloud SSO is enabled, the issues let an attacker bypass forticloud SSO using a crafted SAML message. Because of improper signature verification. Forta Cloud SSO is off by default, but is automatically enabled during forticare registration unless manually disabled. Fortinet recommends turning off Forticloud SSO until systems are updated. No evidence yet of exploitation Storm0249 abuses EDR processes Storm0249, a ransomware access broker, is increasingly exploiting legitimate EDR software and Windows tools to move within networks, gather data, and maintain persistence. Its click fix campaigns trick users into running commands that install malware disguised as Microsoft Support files or Sentinel One DLLs, letting attackers execute code without triggering alerts. The group also uses built in utilities like Curl Exe and fileless PowerShell scripts to blend in with normal operations, Relayaquest warns. These tactics highlight gaps in signature based defenses and and urge behavioral monitoring, EDR baselining and strict lobin restrictions. Gits Battered in Zero Day Attacks A zero day vulnerability in Gogs, a self hosted git service, is actively being exploited with more than 700 of roughly 1400 Internet exposed instances already compromised. It lets authenticated users overwrite files outside repositories to via symbolic links, leading to remote code execution. Attackers have used the Super Shell C2 framework to deploy payloads, though post compromise activity largely unknown at this time. Wiz researchers advise disabling open registration, limiting Internet exposure and monitoring for suspicious repositories or put contents API use while Gogs works on effects. Qlik Fix Style attack uses Grok ChatGPT for malware a new Qlik Fix style attack is using SEO poisoning and legitimate AI platforms like ChatGPT and Grok to deliver Mac infostealer malware. Users searching for common troubleshooting tasks are directed to AI chat links that provide instructions which secretly install malware, harvest credentials and maintain persistence, Huntress warns. This method exploits trust in AI and bypasses traditional protections, potentially becoming a major initial access vector for stealers over the next six to 18 months. Defenses include monitoring behavioral anomalies, restricting terminal command use and practicing strong password hygiene. If you have thoughts on the news from today or about our show in general, we would love to hear from you. Be sure to reach out to us@feedbackisoseries.com I am Sarah Lynn reporting for the CISO series and you stay safe and warm out there. You hear me?
A
Cybersecurity headlines are available every weekday. Head to cisoseries.com for the full stories behind the headlines.
B
It.
Host: Sarah Lane
Produced by: CISO Series
This episode delivers the latest developments in the cybersecurity world, focusing on high-profile incidents and trends such as the Coupang CEO’s resignation after a massive data breach, the actions of pro-Russia hacktivist groups against US infrastructure, record investments in Israeli cyber startups, and multiple critical vulnerabilities and cyberattack techniques being leveraged globally. Information is presented in a concise, news-style report designed for security professionals and those tracking the global cybersecurity landscape.
| Segment | Timestamp | |---------------------------------------------|------------| | Coupang CEO Resigns | 00:15 | | Russian Hacktivists Target US Infrastructure| 00:56 | | Record Israeli Cyber Funding | 01:37 | | Aeroflot Vendor Breach | 02:38 | | Fortinet Auth Bypass Vulnerabilities | 03:55 | | Storm0249 EDR Abuse | 04:48 | | Gogs Zero Day Exploitation | 05:17 | | Qlik Fix AI Infostealers | 06:00 |
The episode concludes with concise recommendations and defense strategies, reflecting the show’s expert yet approachable tone. Sarah Lane’s delivery is direct, keeping listeners informed and engaged on fast-moving security threats.
Quote:
“You stay safe and warm out there. You hear me?” — Sarah Lane [07:32]
For more details on each story, visit CISOseries.com.