August 2025: Surge in Cyber Threats Targets Facebook, Google, and More

August 11, 2025
August 2025: Surge in Cyber Threats Targets Facebook, Google, and More
  • The week of August 4 to August 10, 2025, witnessed a surge in significant cybersecurity incidents, highlighting the evolving threat landscape.

  • Phishing attacks specifically targeted Facebook users during this period, employing fake login pages to steal credentials and underscoring the necessity for user education on recognizing such threats.

  • On August 7, a phishing campaign aimed at Facebook users was reported, indicating a troubling rise in social media scams.

  • Additionally, the LikeJack Trojan exploited social media through clickjacking techniques, misleading users into promoting malicious content without their consent.

  • Malwarebytes identified a malware campaign on the same day, utilizing the LikeJack Trojan to trick users into liking Facebook posts via compromised blogspot pages.

  • On August 7, it was revealed that hackers successfully exploited employees at major companies like Google and Adidas through a phone scam to access Salesforce data.

  • This incident emphasized vulnerabilities in cloud service security and the urgent need for enhanced protective measures.

  • In a related legal development, a jury ruled that Meta unlawfully accessed sensitive data from the Flo app, designed for women's reproductive health tracking, without user consent.

  • This ruling raised substantial privacy concerns and potential legal implications for Meta, which faced backlash for its actions.

  • In the realm of mobile security, Malwarebytes received the MRG Effitas Android 360° certification, underscoring the importance of robust defenses against evolving mobile threats.

  • To enhance mobile and social media security, experts recommend timely updates, comprehensive security solutions, and vigilance regarding suspicious communications.

  • Furthermore, the FBI alerted the public about QR code scams sent via physical mail, illustrating a shift in cybercriminal tactics to target individuals through traditional methods.

Summary based on 2 sources


Get a daily email with more Tech stories

More Stories