In this edition of the CyberHub Podcast, host James Azar shares the latest developments in cybersecurity patch releases, industrial control systems (ICS) security, and a bizarre scheme involving North Korean IT workers. Despite nursing a weary voice from the S4 conference, he offers a thorough rundown of Microsoft’s Patch Tuesday chaos, critical Adobe fixes, industrial advisories from Siemens and Schneider Electric, and new data highlighting India’s rising cybercrime.
Plus, learn about how an Arizona woman helped funnel millions of dollars to North Korea by running an illicit laptop farm. Grab your coffee—this is your daily dose of cybersecurity headlines.
👀 SHOW Supporters:
Today's episode is supported by our friends at Nudge Security. All CyberHub Podcast community members can get a free 14-day trial of their solution for securing SaaS and genAI at https://www.nudgesecurity.com/cyberhub
Microsoft’s Patch Tuesday Breakdown
Microsoft released fixes for 55 documented software defects across Windows operating systems and applications. Among the most pressing issues is CVE-2025-2139, a Windows Storage Elevation of Privilege vulnerability allowing attackers to delete targeted files, potentially causing major disruptions. Additionally, the Ancillary Function Driver for WinSock flaw (CVE-2025-21418) can grant system privileges to attackers, and a wormable LDAP remote code execution bug (CVE-2025-21376) could rapidly spread between servers.
Another serious vulnerability targets Microsoft Excel (CVE-2025-21387) and can be exploited via the Preview Pane without user interaction. Given active exploits and the potential for widespread disruption, administrators are urged to patch these vulnerabilities immediately.
Adobe’s Critical Software Updates
Adobe has rolled out patches for 45 vulnerabilities across its product suite, addressing critical flaws that can lead to remote code execution, security feature bypass, and privilege escalation. The largest batch of critical bugs affects Adobe Commerce, which can be exploited for arbitrary code execution and privilege escalation. Additionally, InDesign received fixes for memory safety issues like out-of-bounds writes and buffer overflows, while Illustrator, InCopy, and Substance 3D Designer were also patched.
Although Adobe reports no known in-the-wild exploits, users are advised to update these products swiftly to minimize risk.
Intel’s 2024 Vulnerability Report
Intel’s report reveals it patched 374 vulnerabilities across software, firmware, and hardware in 2024, rewarding bug bounties for around half of these discoveries. The majority of the issues—272—were found in Intel utilities, drivers, and software, with a further 81 flaws addressed in firmware, including BIOS and networking products.
This data underscores Intel’s proactive approach to cybersecurity, though the sheer number of vulnerabilities highlights the ongoing need for regular updates and monitoring in enterprise environments.
ICS Security Advisories from Siemens & Schneider Electric
Siemens published 14 new advisories covering roughly 100 vulnerabilities affecting multiple products, including some that involve third-party components. Addressed systems range from Scalance W devices to the SIPROTEC 5 series, with patches in progress or available for immediate deployment.
Schneider Electric’s four advisories detail nine vulnerabilities in ASCO Remote On-Kit AIR products, some rated as high severity due to their potential for causing system disruptions or exposing sensitive data. Because ICS environments typically run around the clock, organizations are encouraged to adopt mitigation strategies like network segmentation and thorough patch testing to avoid unplanned downtime.
Fortinet Clarifies Zero-Day Confusion
In response to reports suggesting a new zero-day vulnerability, Fortinet clarified that CVE-2025-24472 is not an active zero-day. Still, flaws in FortiOS, FortiProxy, and FortiWeb products allow attackers to create unauthorized admin or local user accounts and modify firewall policies. While not classified as zero-day exploits, these vulnerabilities remain critical, underscoring the importance of timely patching and robust configuration checks.
OpenSSL High-Severity Flaw (CVE-2024-12797)
OpenSSL announced its first high-severity vulnerability in two years, disclosed by Apple. Labeled CVE-2024-12797, the flaw centers on the use of raw public keys in TLS authentication. Under certain circumstances, clients might fail to properly authenticate a server, exposing them to potential attacks.
Only OpenSSL versions 3.2, 3.3, and 3.4 with raw public keys explicitly enabled are affected, and the OpenSSL Project recommends upgrading to the latest patch releases (3.2.4, 3.3.2, or 3.4.1) to mitigate the risk.
India’s Rising Cybercrime
Cybercrime in India has surged by 51% over the past year, with 1.7 million complaints reported in 2024. Experts believe the increase is partly due to improved awareness and digital transformation, but also more sophisticated attacks targeting both individuals and businesses. Many scams reportedly originate from cybercriminal groups in Cambodia, Myanmar, and Laos. As India continues to digitize government services, stakeholders are encouraged to enhance their cybersecurity measures and educate users on online threats.
Arizona Woman’s North Korean Laptop Farm
An Arizona resident, 48-year-old Christina Marie Chapman, pleaded guilty to running a laptop farm employing North Korean IT workers. Authorities allege that the scheme generated over $17 million, most of which was funneled back to North Korea’s weapons and ballistic missile programs. Chapman faces a possible prison sentence of seven to nine years after pleading guilty to multiple conspiracy and money laundering charges. Her case is one of several highlighting how the North Korean regime has leveraged remote IT work to evade sanctions and finance illicit activities.
Bullet Point Action List
Apply Microsoft Patches: Prioritize fixes for Windows Storage (CVE-2025-2139) and WinSock (CVE-2025-21418) vulnerabilities.
Update Adobe Products: Protect against RCE by patching Adobe Commerce, InDesign, Illustrator, and others.
Review Intel Updates: Ensure firmware, drivers, and software are current to address potential exposures.
Evaluate ICS Network Security: Patch Siemens and Schneider Electric products promptly, and consider micro-segmentation.
Fortinet Products: Verify you’re running the latest versions of FortiOS, FortiProxy, and FortiWeb to avoid unauthorized admin creation.
OpenSSL Patch: Update to the latest release if raw public keys are used in TLS authentication.
India Focus: Strengthen cybersecurity for operations in India, where digital transformation and cybercrime are both on the rise.
Employee Verification: Enforce stricter onboarding checks to avoid inadvertently hiring North Korean operatives.
Good morning, Security Gang—thank you for tuning in. Remember to subscribe, share, and like for the latest cybersecurity insights, and stay cyber-safe!
✅ Story Links:
https://www.securityweek.com/microsoft-patches-wormable-windows-flaw-and-file-deleting-zero-day/
https://www.securityweek.com/adobe-plugs-45-software-security-holes-warn-of-code-execution-risks/
https://www.securityweek.com/intel-patched-374-vulnerabilities-in-2024/
https://www.securityweek.com/sap-releases-21-security-patches/
https://www.securityweek.com/high-severity-openssl-vulnerability-found-by-apple-allows-mitm-attacks/
https://www.darkreading.com/cyber-risk/indias-cybercrime-problems-nation-digitizes
https://therecord.media/arizona-woman-pleads-guilty-north-korean-laptop-farm
🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1
🚨 Important Links to Follow:
👉Website:
👉Listen here: https://linktr.ee/cyberhubpodcast
✅ Stay Connected With Us.
👉Facebook: https://www.facebook.com/CyberHubpodcast/
👉LinkedIn: https://www.linkedin.com/company/cyberhubpodcast/
👉Twitter (X): https://twitter.com/cyberhubpodcast
👉Instagram: https://www.instagram.com/cyberhubpodcast
🤝 For Business Inquiries: info@cyberhubpodcast.com
=============================
🚀 About The CyberHub Podcast.
The Hub of the Infosec Community.
Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.
Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.
Share this post