Urgent Tech & Cybersecurity News for August 20, 2025: AI Threats, Zero-Days, Microsoft Outages & More

```html Top Tech Headlines for August 20, 2025 - BootableUSBs.com

Top Tech Headlines for August 20, 2025

From AI gone rogue and zero-day attacks to password manager flaws and Microsoft patch chaos — today's cybersecurity landscape is buzzing. Here’s everything tech-savvy users should know to stay safe in a connected world.

Lovable AI Platform Misused for Phishing & Malware

Cybercriminals are exploiting the ease of Lovable, an AI website builder, to create phishing portals and malware-laced pages. Though meant for fast and friendly web design, bad actors are turning this tool into a backdoor for scams. It's a reminder that even productive AI can be weaponized.

Apple Emergency Update Fixes Actively Exploited Zero-Day

Apple rolled out an urgent software patch to fix a zero-day vulnerability used in sophisticated attacks. While details remain sparse, the flaw was reportedly part of a targeted campaign. If you haven’t updated your iPhone or Mac yet — now’s the time.

“Rapper Bot” Operator Charged After 370,000+ DDoS Attacks

The U.S. Department of Justice has charged the creator behind Rapper Bot, a DDoS-for-hire botnet responsible for overwhelming 18,000 victims across 80+ countries. The botnet has now been seized, marking a major win in the fight against cybercrime services-for-rent.

Comet AI Browser Fooled Into Buying Fake Goods

Security researchers have shown that Perplexity’s Comet AI browser — designed to act autonomously online — can be tricked into interacting with shady sites and even ordering fake items. The attack reveals the risks of agentic AI behavior without proper controls.

Hackers Exploit ADFS Redirects to Phish Microsoft Logins

Threat actors are leveraging legitimate office.com ADFS redirects to lure users into phishing traps. The technique masks the malicious intent behind official-looking Microsoft URLs, making this click-based scheme dangerously effective. Businesses using ADFS should review their defenses ASAP.

Clickjacking Vulnerability Hits Password Managers

Six leading password managers are found vulnerable to clickjacking that could expose logins, two-factor codes, and credit cards. Researchers say DOM-based extension manipulation makes this possible, and patches remain unavailable for several affected tools.

Microsoft Copilot and Office.com Experience Ongoing Outage

Microsoft is investigating a widespread outage in North America affecting Office.com and their Copilot AI tools. While the root cause is still under review, productivity apps are currently unreliable for many enterprise users.

Email Security Needs an Endpoint Rethink

Experts say email security today is where antivirus used to be — heavily prevention-based, but lacking visibility. A new push is emerging around the concept of “EDR for email,” aiming to bring post-compromise detection and cross-app awareness.

Windows 11 Causing SSD Failures Post-Update

Microsoft is working on a fix after Windows 11 24H2 updates were linked to SSD and HDD corruption on some systems. Reports suggest a spike in data loss incidents, adding to user frustration following recent update troubles.

Windows Upgrade Errors and Recovery Tools Patched

Microsoft has released emergency updates to resolve upgrade failures with the error 0x8007007F and to fix recovery features that broke following August’s security patches. Essential for users who rely on system reset or fresh installs to recover from issues.

Most Gen AI Still Doesn’t Boost Financial Returns

According to MIT’s NANDA report, 95% of enterprise AI deployments aren’t delivering meaningful financial impact. While potential remains high, expectations may need recalibration around current implementations and short-term productivity.

Google Cloud Launches AI Ally for Cybersecurity Teams

Google Cloud has introduced a new AI assistant aimed at augmenting busy infosec teams. The move reflects the rising demand for tools that not only detect threats but also reduce human burnout on the security frontlines.

UK Full Fibre Broadband Segments Speed Ahead

While growth in the UK broadband market is sluggish overall, full-fibre adoption has surged. Experts cite competition from alternative networks and government push for fiber-first strategies as key drivers.

Yext Launches 'Scout' to Track AI-Based Search Visibility

Yext’s new AI tool called “Scout” helps businesses monitor their visibility across traditional and AI-driven search results. As generative AI changes how customers discover brands, tools like this aim to keep SEO strategies relevant.

Google Alters Play Store Rules in the EEA

Google has made changes to developer fees and rules for the Play Store in the European Economic Area. Critics argue the update still falls short of true competitiveness and regulatory alignment.

Huawei Unveils New Kirin Chip After Years of Silence

Huawei has officially disclosed specs for its new Kirin 9020 SoC, engineered for the Pura 80 smartphone. This marks a major comeback in mobile silicon amid ongoing U.S. tech sanctions.

Nvidia Reveals Blackwell AI Chip for China

Nvidia is developing a new Blackwell-based AI chip for the Chinese market. Positioned between its H20 and B300 models, this chip helps Nvidia keep up with export limits while maintaining competitiveness.

FBI: Russian Hackers Still Targeting Cisco Vulnerabilities

The FBI warns that Russian FSB-linked hackers continue exploiting an old Cisco vulnerability (CVE-2018-0171) to compromise global infrastructure. This multi-year operation highlights the risks of leaving legacy devices unpatched.

Shadow AI Agents Go Undetected in Enterprise Networks

New research shows that many organizations have shadow AI tools operating outside sanctioned IT. These agents increase identity and data risks by bypassing traditional security and compliance pipelines.

PromptFix Exploits AI Browsers with Fake CAPTCHAs

A clever method called PromptFix has been found tricking AI-powered browsers like Comet into executing hidden tasks, including auto-filling credit cards. As AI takes on more tasks, securing user intent becomes critical.

North Korea Using GitHub, Cloud Services for Cyber Espionage

North Korean hackers used GitHub and cloud platforms to infiltrate diplomatic institutions and pose as IT workers at over 320 companies. The campaign blends espionage with credential theft across diverse industries.

Business Impact Analysis Essential for Resilient Recovery

New insights reinforce that having a Business Impact Analysis (BIA) in place dramatically improves organizational recovery during crises. The push for smarter, faster digital resilience is gaining traction industry-wide.

Want to stay ready for anything? From data recovery to bootable OS installs, our Ultimate USBs have your back. Check out our tools today.

```

RELATED ARTICLES