CyberSecurity Knuggets
Dec 07, 2025
Email 1: Best infosec-related long reads for the week of 11/29/25
Sender: info@metacurity.com
Subject: Best infosec-related long reads for the week of 11/29/25
Content Summary:
– Southeast Asian economies are growing dependent on sophisticated cyber scams, notably “pig-butchering” scams that involve cultivating relationships online and defrauding victims via cryptocurrency investments. This criminal industry is now estimated at $70 billion+ annually, with major operations in countries like Cambodia and Laos.
– India’s expanding digital economy faces a dark side: cybercrime exploits unemployed youth through scam operations abroad, as exemplified by Chetan Kokare’s story — recruited under false pretenses to manage scam call centers targeting Indian victims, leading to legal consequences.
– The story of Mr DeepFakes, the largest nonconsensual deepfake porn website, revealed how AI porn exploded from an early online community that evaded early moderation and regulation. The site caused widespread harm before shutting down in May 2025 amid rising legal and reputational pressure.
– Starlink’s rapid global adoption, particularly in countries like Bangladesh, has outpaced regulatory safeguards, raising surveillance, security, sovereignty, and privacy concerns. Elon Musk’s control over Starlink’s coverage has brought attention to risks posed by reliance on foreign satellite internet infrastructure.
– A practical digital operational security (opsec) guide for teenagers emphasizes strong, unique passwords managed through password managers, use of two-factor authentication, and compartmentalization of accounts to prevent account takeovers and limit damage.
Call to Action:
– Readers are encouraged to upgrade to a paid subscription for ongoing in-depth infosec updates and consider sponsorship opportunities to promote their products or events.
– Contact: cynthia@metacurity.com for support or sponsorship details.
Email 2: 🚨WK 49: Fintech Breach, NPM Worm, EU Fine, NATO Cyber Exercise & More
Sender: thecybersecurityclub@mail.beehiiv.com
Subject: 🚨WK 49: Fintech Provider Breach Exposes U.S Banks Data, NPM Worm Wars, EU Slaps X with €140 Million Fine, NATO Largest-Ever Cyber Defense Exercise…
Content Summary:
– A new stealthy backdoor malware named “SmoothOperator,” attributed to China-linked APT31, targets Windows systems using advanced stealth techniques like process hollowing and encrypted C2 communications to facilitate espionage and data theft.
– Critical vulnerabilities: The “React2Shell” remote code execution flaw in the npm package react2static is actively exploited. Google patched 13 critical vulnerabilities affecting Android devices. CISA ordered mandatory patches for exploits in WSO2 and SolarWinds software.
– Malware campaigns: The “Water Saci” threat actor targets Latin America with custom malware. The Aisuru botnet conducted a record-breaking 2.97 Tbps DDoS attack via exploits in Ray AI frameworks. Supply chain attacks, including the evolving ‘Sha1-Hulud’ npm/GitHub worm, continue to threaten global developers.
– Major incidents: Cyberattack on beverage giant Asahi causes production disruption; a fintech provider breach exposes data for dozens of US banks and credit unions.
– Threat intelligence: NATO conducted its largest cyber defense exercise ‘Locked Shields’ in Estonia; India faces privacy backlash over a mandatory government cyber safety app; Poland detained a Russian alleged hacker working for Russian intelligence; global law enforcement disrupted a major crypto mixer laundering billions; Russia-linked Calisto targeted NGO Reporters Without Borders.
– Legal & policy updates: EU fined platform X €140 million for Digital Services Act violations; California enacts pioneering browser security law with mandated security tools; AI policy and infrastructure security discussed in US congressional hearings; joint guidance on secure AI integration released by multiple nations.
– Upcoming event: BlackHat London 2025 focuses on AI in cybersecurity with an invitation to co-sponsor.
Calls to Action:
– Register interest or sponsor events via team@thecybersecurity.club
– Join their LinkedIn Group for community engagement
– Update email preferences or unsubscribe anytime
Both emails provide specialized cybersecurity insights emphasizing current global threats, regulatory actions, and practical advice for professionals and enthusiasts.
Stay Well!
