Each week I spend hours going throguh 20+ different cybersecurity news sources to find and summarise most interesting news from the week so you can quickly catch up on only the most interesting cyber news quickly.
Summary
The UK government is phasing out SMS-based two-factor authentication in favor of passkeys for logging into digital services. Passkeys use device-bound cryptographic keys and offer a far more secure and user-friendly alternative to passwords and SMS codes. The National Cyber Security Centre is backing the move, and the UK has formally joined the FIDO Alliance—marking one of the most significant government adoptions of passwordless technology to date.
Key Details
Next Steps
Read more on NCSC, Gov InfoSecurity, and Infosecurity Magazine
Summary
Google is rolling out “Advanced Protection” mode for Android 16 to defend high-risk users—like journalists and political targets—against commercial spyware and mobile malware. Much like Apple’s Lockdown Mode, this toggle enforces multiple protections at once, including disabling sideloading, blocking 2G networks and risky USB access, and logging any intrusion attempts for forensic review.
Key Details
Read more on SecurityWeek
Summary
Threat actors are capitalizing on the buzz around generative AI by distributing fake AI apps that install remote access tools and password stealers. Posing as cracked versions of tools like OpenAI or Sora, these lures are distributed via SEO-poisoned pages, fake GitHub repos, and social media, particularly targeting users looking for free or unofficial AI tools. Once installed, the malware gives attackers full access to the victim’s system or browser data.
Next Steps
Read more on Dark Reading
Summary
A malicious npm package namedos-info-checker-es6
was found disguising itself as a system utility while secretly embedding a payload dropper using invisible Unicode characters. It contacts a Google Calendar event to retrieve a hidden Base64-encoded command, effectively using the calendar as a stealthy command-and-control (C2) channel. The campaign appears to be a proof-of-concept or a targeted attack, with several related packages suggesting coordinated distribution.
Key Details
preinstall.js
, evading static detection.vue-dev-serverr
, vue-dummyy
, and vue-bit
—also reference the malicious package.Next Steps
os-info-checker-es6
and its related packages.Read more on The Hacker News
Summary
Researchers have uncovered a massive ad fraud operation called “Kaleidoscope” that is infecting more than 2.5 million devices each month via malvertising and fake browser extensions. Once installed, the malware simulates user activity like scrolling and clicking on ads in the background to generate ad revenue, while exfiltrating user data.
Key Details
Next Steps
Read more on Risky Business Media
Summary
A wave of cyberattacks has disrupted some of the UK’s biggest retailers, with Marks & Spencer confirming customer data theft and reportedly seeking up to £100 million in insurance coverage. The attacks, which also impacted the Co-op and Harrods, are suspected to be part of a larger campaign attributed to the Scattered Spider group. Google warns that this actor has now pivoted to targeting US retail as well.
Key Details
Next Steps
Read more on The Record, The Record, and Dark Reading
Summary The European Union has officially launched the European Vulnerability Database (EUVD), developed by ENISA under the NIS2 Directive. Initiated in 2022, the EUVD aims to provide a centralized platform for publicly known ICT vulnerabilities, enhancing the EU's cybersecurity resilience and reducing reliance on external databases like the U.S.-based CVE system.
Key Details
See it in action: https://euvd.enisa.europa.eu/
Read more on ENISA, Infosecurity Magazine, and Heise Online
Summary
Bug bounty platforms are facing a surge of AI-generated vulnerability reports that waste researcher time, slow down triage teams, and in some cases closely mimic actual bugs found in open-source code. Researchers warn that generative AI is now being used to produce convincing—but fake—proof-of-concept code and vulnerability writeups, sometimes designed to trick programs into paying bounties for nonexistent flaws.
Key Details
Next Steps
Read more on 404 Media
Summary
LockBit, once one of the most prolific ransomware-as-a-service (RaaS) gangs, has suffered another major blow: an unknown party breached its infrastructure and leaked the group’s affiliate panel and internal communications. The 60,000-record SQL dump reveals affiliate chats, victim negotiations, affiliate identities, build configurations, and tactical insights—offering defenders a rare look into the operational guts of a ransomware outfit just months after Operation Cronos had already disrupted it.
Key Details
Read more on Dark Reading
Summary
Leaked documents reveal that Flock, the company behind 5,000+ license plate reader networks across the U.S., is developing a powerful new surveillance platform called “Nova.” The tool combines license plate data with breached information, public records, and people search services to let police “jump from plate to person”—and then to that person’s broader network. Internal Slack messages show even Flock employees are questioning the ethics of this system.
Key Details
Read more on 404 Media
Summary
As deepfake technology accelerates, attackers are using AI-generated voices and videos to impersonate trusted individuals in real time—particularly in high-stakes virtual meetings and job interviews. The scale and realism of these attacks has outpaced detection tools, with security researchers urging a shift from reactive deepfake detection to proactive identity verification using cryptographic proof and device compliance checks.
Key Details
Read more on The Hacker News
Summary
WhatsApp is introducing a system called “Private Processing” to power new AI features like message summarization without breaking its core promise of end-to-end encryption. Built on hardware-backed Trusted Execution Environments, the system processes user prompts in isolated cloud infrastructure that Meta says even it can’t access. While researchers praise the design, others warn that shifting private chats closer to cloud AI inference makes them a high-value surveillance target, regardless of good intentions.
Key Details
Next Steps
Read more on WIRED
Summary
Coca-Cola’s new “Classic” ad campaign uses AI to celebrate famous authors by highlighting book excerpts that mention the brand—except one ad attributed a quote to J.G. Ballard that he didn’t write, from a book he didn’t author, dated in a year that doesn’t match.
This is another case that underscores the importance of having effective AI use policies in place as when not used responsibly the collateral damage to the organisations reputation can be substantial. This is already the second time Coca Cola has a similar issue with AI generated ads, last being just last christmas.
Next Steps:
Read more on 404 Media