Post

Weekly Cybersecurity Roundup: July 7 – July 13, 2025

Weekly Cybersecurity Roundup: July 7 – July 13, 2025

TL;DR

This week’s cybersecurity roundup includes significant incidents such as deepfake impersonations targeting government secrets, data leaks from AI bots, and widespread spying through malicious browser extensions. Key highlights include security concerns around AI access to personal data and the investigation of a ransomware negotiator. Additionally, the hacking of a popular game and debates on free certificates for IP addresses are discussed.

Main Content

Last week on Malwarebytes Labs saw a series of significant cybersecurity events that highlight the evolving landscape of digital threats. Here’s a recap of the major incidents:

Deepfake Impersonations

Deepfake technology was utilized by criminals to impersonate Marco Rubio in an attempt to uncover government secrets. This incident underscores the growing threat of deepfakes in cyber espionage1.

Data Leaks from AI Bots

McDonald’s AI bot experienced a data leak, exposing sensitive information about job applicants. This breach raises concerns about the security of AI systems handling personal data2.

Malicious Browser Extensions

Millions of users were spied on by malicious browser extensions in Chrome and Edge. This widespread surveillance highlights the importance of vetting browser extensions for security3.

AI Access to Personal Data

Google’s decision to allow its Gemini AI access to user apps, including messages, has sparked privacy concerns. Users are wary of the potential misuse of their personal data4.

Ransomware Negotiator Investigation

A ransomware negotiator is under investigation for alleged kickbacks from criminal gangs. This development sheds light on the complexities and ethical dilemmas in ransomware negotiations5.

Free Certificates for IP Addresses

The debate over free certificates for IP addresses continues, with discussions on whether they pose a security problem or a solution. This topic is crucial for understanding the future of internet security6.

Gaming Security Breach

Gamers playing Call of Duty: WWII were hacked, leading to the temporary offline status of the PC version. This incident emphasizes the need for robust security measures in the gaming industry7.

Additional Resources

For further insights, check out the following resources:

Stay safe and protect your devices by downloading Malwarebytes today.

For more details, visit the full article: source

Conclusion

The cybersecurity landscape continues to evolve with new threats and challenges. Staying informed and proactive is crucial for protecting against these emerging risks.

References

  1. Deepfake Criminals Impersonate Marco Rubio to Uncover Government Secrets (2025). “Deepfake criminals impersonate Marco Rubio to uncover government secrets”. Malwarebytes Labs. Retrieved 2025-07-14. ↩︎

  2. McDonald’s AI Bot Spills Data on Job Applicants (2025). “McDonald’s AI bot spills data on job applicants”. Malwarebytes Labs. Retrieved 2025-07-14. ↩︎

  3. Millions of People Spied On by Malicious Browser Extensions in Chrome and Edge (2025). “Millions of people spied on by malicious browser extensions in Chrome and Edge”. Malwarebytes Labs. Retrieved 2025-07-14. ↩︎

  4. No Thanks: Google Lets Its Gemini AI Access Your Apps, Including Messages (2025). “No thanks: Google lets its Gemini AI access your apps, including messages”. Malwarebytes Labs. Retrieved 2025-07-14. ↩︎

  5. Ransomware Negotiator Investigated Over Criminal Gang Kickbacks (2025). “Ransomware negotiator investigated over criminal gang kickbacks”. Malwarebytes Labs. Retrieved 2025-07-14. ↩︎

  6. Free Certificates for IP Addresses: Security Problem or Solution? (2025). “Free certificates for IP addresses: security problem or solution?”. Malwarebytes Labs. Retrieved 2025-07-14. ↩︎

  7. Gamers Hacked Playing Call of Duty: WWII—PC Version Temporarily Taken Offline (2025). “Gamers hacked playing Call of Duty: WWII—PC version temporarily taken offline”. Malwarebytes Labs. Retrieved 2025-07-14.] ↩︎

This post is licensed under CC BY 4.0 by the author.