Top Tech Headlines – August 14, 2025
Welcome to your daily tech brief! Today brings a mix of cyber crackdowns, ransomware threats, phishing schemes, and AI shakeups. If you’re in IT, cybersecurity, or just want to stay protected in the digital wild west, don’t miss these important updates.
Over $300 Million in Cybercrime Crypto Seized
Authorities and private organizations have frozen over $300 million in cryptocurrency tied to fraud and cybercrime. The action stems from two coordinated anti-fraud operations, signaling that law enforcement is stepping up surveillance on illicit crypto flows. If you thought crypto was untraceable, think again.
Crypto24 Ransomware Bypasses Security with Custom Tools
The Crypto24 ransomware gang isn’t just encrypting files anymore—they’re using custom-built tools to sidestep endpoint detection systems. Their malware exfiltrates data before locking systems, making recovery and containment even trickier. Enterprises should bolster network monitoring and endpoint protection now.
Pro-Russian Hackers Sabotage Norwegian Water Dam
Norwegian authorities have confirmed that pro-Russian hackers breached control systems at a water dam, maliciously opening outflow valves. This cyberattack highlights growing concerns about threats to critical infrastructure. Operational technology (OT) is now very much in cybercriminal crosshairs.
Microsoft Fixes Cluster and VM Glitches in Windows Server
Good news for sysadmins: Microsoft has patched a bug that was causing cluster services and virtual machines to unexpectedly restart after the July 2019 Windows Server update. If you’ve faced unplanned outages, it’s time to apply that fix.
Booking.com Phishing Uses a Tricky Unicode Character
A new phishing campaign mimics Booking.com URLs using the Japanese character "ん", tricking users into clicking malicious links that look legit. Some systems render it as a forward slash, making detection tough. Double-check links before clicking—especially when handling emails involving bookings or payments.
Ransomware’s New Focus: Stealth Over Encryption
The Picus Blue Report 2025 delivers a sobering stat: only 3% of data exfil attempts are stopped. Ransomware actors now prefer to quietly steal data rather than just encrypt it. Businesses should start thinking data leakage prevention, not just backups.
Canadian House of Commons Probes Data Breach
Canada's House of Commons is digging into a cyberattack that led to the leak of employee information. The government is assessing the scope, reminding everyone just how fragile public sector systems can be in the wrong hands.
OpenAI's Browser Leak Shows ChatGPT Agent Control
Leaked details about OpenAI’s upcoming browser show deep integration with its GPT Agent, enabling automated web control. This marks a shift toward highly agentic browsing—where AI could handle not just search, but interaction. Think chatbot meets browser bot.
CISA Flags Zero-Day Flaws in N-able N-central
Two actively exploited vulnerabilities in N-able’s remote management platform have landed on CISA’s radar. Agencies must patch by August 20 to avoid being compromised. MSPs running N-central should update immediately.
Windows 11 Update Error Finally Resolved
If you faced the 0x80240069 update failure with Windows 11 24H2, relief is here—Microsoft has rolled out a fix. The glitch was affecting WSUS delivery specifically, blocking August updates from being installed in enterprise environments.
Google Gemini’s "Deep Research" Coming to API
Gemini’s powerful Deep Research feature is finally making its way beyond Google's UI and into developer APIs. This change will allow devs to integrate advanced multi-source AI insights into custom applications. Research automation just got easier.
DeepSeek AI Project Delayed After Chipset Failure
DeepSeek’s R2 model launch hit a wall when Huawei’s Ascend chips couldn't meet the training demand. The company has reverted to Nvidia GPUs, causing delays. It’s a big reminder of how hardware choices can make—or break—AI timelines.
Deutsche Telekom Launches “AI Phone” Powered by Perplexity
The telecom giant’s new T Phone 3 and T Tablet 2 tout integrated AI capabilities through Perplexity partnerships. Marketed as affordable “AI-first” devices, they bring question-answering, summarization, and conversational AI into daily mobile use.
New HTTP/2 Vulnerability Enables DoS Exploits
The ‘MadeYouReset’ flaw bypasses Rapid Reset protections in HTTP/2, affecting major web servers. This opens up new possibilities for large-scale denial-of-service (DoS) attacks. Admins should look out for upcoming patches to keep services online.
Cobalt Strike Now Reaching macOS and Linux via CrossC2
CrossC2 enables Cobalt Strike beacon implants to run on macOS and Linux—traditionally tougher targets for this tool. Threat actors are using these cross-platform payloads alongside ransomware to expand their reach and evade detection.
Have You Turned Off Your Virtual Oven?
External attack surface management (EASM) and digital risk protection (DRP) tools can help detect overlooked cloud systems or exposed accounts. Think of it like turning off appliances you forgot you left on—before they spark a fire.
Android Malware Surge Targets Banks via NFC and Root Exploits
New Android malware including PhantomCard and SpyBanker are hijacking banking sessions and using NFC relay attacks to perform fraudulent transactions. KernelSU exploits are also being used to gain root on newer devices. Mobile users need strong app vetting and updated device security.
Reduce Your Attack Surface with These Basics
Security pros continue to emphasize foundational defenses: block unknown apps, enforce multi-factor authentication (MFA), and monitor for credential theft. These simple changes go a long way in stopping ransomware at the gate.
Google Enforces Crypto App Licensing After Massive Scam Losses
Google Play will now require license verification for all crypto-related apps in 15 regions. The move follows warnings from the FBI about $9.9 million in losses from fake crypto apps. This could significantly raise the bar on mobile app security in the space.
Want to stay ready for anything? From data recovery to bootable OS installs, our Ultimate USBs have your back. Check out our tools today.
```