Skip to main content

Choose your country

Report

F-Alert US Cyber Threats Bulletin October 2025

Discover the latest online threats and cyber security trends impacting businesses and consumers in the US, brought to you by F-Secure’s threat intelligence specialists.

October’s F-Alert highlights how criminals are weaponizing AI, exploiting trusted platforms, and targeting individuals and organizations with increasingly sophisticated scams. It provides expert commentary and practical guidance to help navigate these risks.

‘Lovable’ AI Website Generator Lowers the Barrier to Phishing

Cyber criminals are exploiting AI website generators like Lovable to launch phishing sites that imitate trusted brands and even use CAPTCHA for credibility—massively lowering the barrier to entry for a once-complex form of cyber crime.

In this article, Laura Kankaala, F-Secure’s Head of Threat Intelligence, explains how AI has streamlined the creation of phishing campaigns compared to the old, labor-intensive methods of scraping websites and manually editing code.

Lovable is a legitimate platform not designed for scams, but like many AI tools, it has been quickly weaponized by criminals for their own gain.

Laura Kankaala, Head of Threat Intelligence at F-Secure

Explore how AI lowers the barrier to phishing (PDF, page 2)

Insider Threats: When Doing Everything Right Still Isn’t Enough

Imagine calling an airline’s official customer service to rebook a flight—only to be transferred to a scammer. That’s what happened to one United Airlines customer, who reported losing $17,000. United has been unable to explain how the call was routed to the scammer or why its logs showed a shorter call than the customer experienced.

In this article, F-Secure Threat Intelligence Researcher Dr Megan Squire examines insider threats—how even people who follow all recommended security practices can still fall victim when corporate insiders go rogue, and how organizations often fail victims in their response.

Companies often investigate internally but don’t always disclose their findings to the public, leaving victims wondering what they could have done differently.

Dr Megan Squire, Threat Intelligence Researcher at F-Secure

Learn more about insider threats (PDF, page 3)

Trending Scam: Job Scams Targeting Young Workers Surge Across the US

Young job seekers are being targeted by job and employment agency scams at unprecedented levels. FTC reports of these scams tripled between 2020 and 2024, while consumer losses soared from $90 million to $501 million over the same period.

In this article, we look at how fraudulent job offers are spreading, the types of scams criminals are devising, and what job hunters can do to protect themselves.

See the latest trends in job scams (PDF, page 4)

Breach That Matters: Credit Bureau TransUnion Exposes Data of 4.4 Million

In the latest of several attacks targeting Salesforce databases, a breach exposed data from 4.4 million TransUnion customers—including, according to one filing, names, Social Security numbers, and birthdates.

In this article, we examine the outcomes of two separate court filings in Maine and Texas, and outline what employees can do to defend against these social engineering attacks.

Learn more about the TransUnion breach (PDF, page 4)

Google’s New Identity Checks Aim to Curb Android Malware

Recent speculation suggested Google would stop supporting sideloading, but this has proved false—sideloading is here to stay. Instead, starting in 2026, Google will require mandatory developer verification, meaning Android developers must prove their real-world identity to distribute apps on certified Android devices.

In this article, F-Secure Threat Advisor Joel Latto outlines the upcoming verification process and weighs its pros and cons for both users and developers.

This new verification process links developers to their applications, increasing accountability. It’s an identity check, not a content review.

Joel Latto, Threat Advisor at F-Secure

Find out what this means for Android security (PDF, page 5)

Gemini AI Exploit Shows the Dark Side of Smart Assistants

Researchers have found that Google’s Gemini AI assistant can be hijacked with nothing more than a calendar invite. By embedding malicious prompts in event titles, email subjects, or shared document names, attackers can launch “targeted promptware attacks” that trick Gemini into executing harmful actions through indirect prompt injection.

In this article, F-Secure Junior Researcher Hafizzuddin Fahmi Hashim examines how AI assistants can expand the attack surface for everyday users—introducing new opportunities for disruption and abuse.

The simplicity of these attacks—requiring only a malicious calendar invite—challenges the assumption that AI exploits are complex.

Hafizzuddin Fahmi Hashim, Junior Researcher at F-Secure

Discover how attackers can exploit AI tools (PDF, page 6)

Experts Behind the Insights

  • Laura Kankaala

    Head of Threat Intelligence, F‑Secure

    Threat researcher and ethical hacker specializing in information security. Kankaala is a keynote speaker, TEDx presenter on stalkerware, podcaster, and Finnish TV personality who educates broad audiences on cyber threats.

  • Dr Megan Squire

    Threat Intelligence Researcher, F‑Secure

    Computer science PhD, author of two books and 40+ peer-reviewed articles, and recipient of Best Paper Awards. A recognized cyber threat expert, Squire has been featured in major media including The New York Times, WIRED, and PBS Frontline.

  • Joel Latto

    Threat Advisor, F‑Secure

    Threat researcher focused on scams and social media. A regular contributor to threat reports, including F-Secure’s F‑Alerts, Latto has also collaborated with Laurea University of Applied Sciences to educate the public on cyber crime.

  • Hafizzuddin Fahmi Hashim

    Junior Researcher, F-Secure

    Security researcher specializing in the intersection of hardware and cyber security. Hashim’s work spans embedded systems (SCADA/ICS at Austin Powder), critical infrastructure protection (Shell EV network), and now threat research.

Get in touch

Interested in becoming a partner? Fill in your information below and we will be in touch shortly.

We process the personal data you share with us in accordance with our privacy statement.

Thank you for your interest

We'll be in touch soon.