Cybersecurity Weekly #11 — The Threats, Trends & Tools You Need to Know (2025 Edition)

Published: (December 11, 2025 at 02:39 PM EST)
3 min read
Source: Dev.to

Source: Dev.to

1️⃣ Deepfake Voice Scams Surge Across the U.S.

Cybercriminals are using AI‑generated voice clones to impersonate CEOs, relatives, and financial advisors.
Victims have reported large unauthorized transfers, especially in small businesses that lack multi‑layer authentication.

Key Takeaway
Never approve a wire transfer based solely on a voice call. Verify through a second channel (email, text, or in‑person code).


2️⃣ Google Chrome Issues Emergency Patch

Google released an urgent update for a high‑severity zero‑day vulnerability affecting millions of users.

If you’re using Chrome:
Update immediately → Settings > Help > About Google Chrome.

The bug allows attackers to execute code remotely, potentially taking over the device.


3️⃣ Passwordless Authentication Adoption Hits New Record

A new report shows that 61 % of U.S. businesses now use some form of passwordless login, including passkeys and biometrics.

Emerging threats

  • Device‑based authentication backups
  • Poorly secured biometric systems
  • AI bypass attacks that fool facial recognition

Recommendation
Use reputable providers (Microsoft, Google, Okta) and enable device‑bound keys + biometric liveness detection.


4️⃣ New Malware: “GhostRabbit” Targets Freelancers

A lightweight malware called GhostRabbit is spreading through fake “job offers” on Upwork, LinkedIn, and Fiverr.

What it does

  • Steals login cookies
  • Captures clipboard data
  • Sends files directly to attacker servers
  • Injects keyloggers without detection

Protect Yourself

  • ❌ Don’t download ZIP or EXE files from clients
  • ❌ Don’t open “portfolio viewers”
  • ✔ Use a VM or browser isolation for unknown clients
  • ✔ Enable passkeys wherever possible

5️⃣ AI‑Generated Phishing Pages Are Now Undetectable

Hackers are using design AI tools to create phishing sites that are pixel‑perfect copies of real banking and SaaS platforms.

Phishing kits auto‑generate

  • Fake SSL certificates
  • Optimized mobile layouts
  • Region‑specific versions
  • Instant credential extraction

Tip
Always check URLs character by character. Even a tiny change like “googIe.com” (capital i) can steal your login.


6️⃣ Microsoft Warns of Token Theft Attacks

OAuth token theft is rising rapidly, allowing attackers to bypass strong authentication.

Stolen tokens enable attackers to

  • Read emails
  • Access cloud files
  • Modify calendars
  • Log in without passwords

Best Protection

  • Use Conditional Access policies
  • Monitor sign‑ins for impossible travel
  • Enable automatic token revocation

7️⃣ Ransomware Groups Now Using Passive AI Monitoring

New ransomware gangs deploy AI bots that quietly monitor networks for weeks before attacking. They collect:

  • Employee behavior
  • Peak usage times
  • Backup cycles
  • VPN activity
  • Misconfigured servers

They strike when the business is most vulnerable—usually late Sunday night.


8️⃣ Tool of the Week: “Passkeys Directory”

A growing resource showing which websites now support passkeys:

👉 https://passkeys.directory/

Great for freelancers, tech bloggers, security‑focused teams, and businesses adopting passwordless logins.


9️⃣ Tip of the Week: Check If Your Email Is Breached

Use this trusted tool to check your email against leaked databases:

👉 https://haveibeenpwned.com

If your email appears in multiple breaches:

  • Switch to passkeys
  • Delete old accounts
  • Enable 2FA for remaining ones
  • Monitor login alerts regularly

🔟 Quick Stats (U.S. Cybersecurity 2025)

  • 74 % of breaches involve credential misuse
  • 43 % of phishing attacks now use AI
  • Passkey adoption grew in 2024–2025
  • 48 % of small businesses face at least one cyber incident yearly
  • Voice deepfakes increased by 700 % this year

Stay alert—cybercrime is evolving faster than ever.


🛡️ Final Thoughts: Stay Safe, Stay Smart

AI is transforming cybersecurity—for both defenders and attackers.

To protect yourself:

  • ✔ Move to passwordless authentication
  • ✔ Don’t trust unsolicited downloads
  • ✔ Verify financial communications
  • ✔ Update your apps weekly
  • ✔ Keep backups offline

Cybersecurity is no longer optional—it’s survival.

Back to Blog

Related posts

Read more »