⏱️ ≈ 7-minute read
Editor’s Note: This week, cyber risk made itself everyone’s business — from courtrooms to car factories. Vendor breaches exposed the trust gap, AI proved it’s not done breaking browsers, and even satellites took a moral stand. Grab your coffee; we’re patching our faith in tech again.

📬 This Week’s Clickables
📌 Big News – NSO faces the music; ransomware brings JLR’s supply chain to its knees
🚨 Can’t Miss – F5 breach fallout, Oracle SSRF in the wild, Microsoft vs. Teams malvertising, State AGs flex privacy power
🤖 AI in Cyber – Nation-states scale AI ops, browsers betray users, and developers vibe-code vulnerabilities
🧪 Strange Cyber Story – Starlink flips the kill switch on scam syndicates
🚨 Big Stories
🔒 Judge Bars NSO from Targeting WhatsApp; Slashes Damages
Intro: A rare courtroom win for privacy — and a sharp rebuke to the spyware industry.
What Happened: A U.S. federal judge permanently barred NSO Group from using or marketing spyware that circumvents WhatsApp, while slashing Meta’s damages claim from $168 million to $4 million. The decision caps a five-year legal fight over Pegasus-style surveillance targeting journalists and diplomats.
Why It’s Important: The injunction sets a major precedent: spyware vendors can’t hide behind sovereign-immunity claims when they attack commercial platforms. It also gives other tech firms a legal playbook for countering private surveillance sellers.
The Other Side: NSO argues its government customers can still lawfully use the tools — meaning the market for mercenary spyware isn’t going dark anytime soon.
👉️ Takeaway: A clear victory for user privacy, but the demand for commercial spyware remains alive and profitable.
TL;DR: The court clipped NSO’s wings — not the entire surveillance industry.
Further Reading: The Record coverage
“Security is a process, not a product.” — Bruce Schneier🚗 Jaguar Land Rover Cyberattack Pegged at $2.5B Economic Hit
Intro: The week’s most expensive reminder that cyber risk doesn’t stop at IT — it hits GDP.
What Happened: Jaguar Land Rover’s August ransomware attack continues to reverberate, with analysts now estimating a £1.9 billion (~$2.5B USD) blow to the UK economy. The outage halted factory production, froze dealership logistics, and disrupted more than 5,000 suppliers across its supply chain.
Why It’s Important: The attack underscores how industrial ransomware has evolved into an economic event, not just an IT one. The cascading effect on suppliers shows that “supply-chain risk” isn’t metaphorical anymore — it’s measurable in billions.
The Other Side: JLR says systems are being restored in phases, and it hasn’t named the attackers or confirmed ransom payments. The UK’s NCSC continues to investigate broader impact.
👉️ Takeaway: Ransomware resilience isn’t just a security strategy — it’s national infrastructure policy.
TL;DR: JLR’s downtime didn’t just stop production — it dragged the entire UK economy into the red.
Further Reading: The Guardian | The Record
The Gold standard for AI news
AI keeps coming up at work, but you still don't get it?
That's exactly why 1M+ professionals working at Google, Meta, and OpenAI read Superhuman AI daily.
Here's what you get:
Daily AI news that matters for your career - Filtered from 1000s of sources so you know what affects your industry.
Step-by-step tutorials you can use immediately - Real prompts and workflows that solve actual business problems.
New AI tools tested and reviewed - We try everything to deliver tools that drive real results.
All in just 3 minutes a day
🔥 Can’t Miss
🧱 F5 Incident Broadens After Source Code Theft
F5 confirmed intruders accessed BIG-IP source code and internal vulnerability data, prompting a CISA emergency directive. No pipeline tampering found, but customers face heightened risk from stolen intel.
👉️ Takeaway: Vendor breach = shared exposure. Audit your dependencies now, not post-incident.🧾 CISA Confirms In-the-Wild Exploitation of Oracle E-Business Suite SSRF (CVE-2025-61884)
The critical SSRF flaw is being actively exploited and now sits on CISA’s KEV list with a Nov 10 patch deadline. Attackers exploit the bug to reach internal ERP systems.
👉️ Takeaway: ERP vulnerabilities aren’t rare anymore — they’re retail shelf staples for attackers.🪟 Microsoft Disrupts Rhysida / Vanilla Tempest Teams Malvertising Wave
Fake Teams installers signed with valid certificates delivered “Oyster” malware via SEO and ad lures. Microsoft revoked over 200 certificates tied to the campaign.
👉️ Takeaway: Signed ≠ safe — internal controls beat external trust seals every time.🏛️ State AGs Quietly Ramp Privacy Enforcement
A new EPIC report highlights more than 1,200 state-level privacy actions since 2019, with data-broker oversight and breach fines on the rise.
👉️ Takeaway: The privacy cops you should fear aren’t in D.C. — they’re in your state capital.
Find out why 100K+ engineers read The Code twice a week.
That engineer who always knows what's next? This is their secret.
Here's how you can get ahead too:
Sign up for The Code - tech newsletter read by 100K+ engineers
Get latest tech news, top research papers & resources
Become 10X more valuable
🤖 AI in Cyber
🛰️ AP: Microsoft Says Adversaries Are Scaling AI in Ops
Microsoft’s latest Digital Defense Report logged 200+ AI-assisted influence and phishing ops in one month, led by Russia, China, Iran, and North Korea. These models generate convincing lures and misinformation faster than defenders can react.
👉️ Takeaway: AI has fully joined the attacker toolkit — treat it as adversary infrastructure.🌐 Atlas Privacy & Attack Surface: Browser AI Goes Rogue
Joint WaPo, Fortune, and SecurityWeek coverage revealed prompt-injection, insecure sidebars, and data-leak risks in AI-powered browsers. Enterprise use policies are already lagging behind adoption.
👉️ Takeaway: The “AI browser” boom is outpacing security governance — expect breaches before controls.🧪 “Vibe Coding” Critique: AI Code Isn’t (Just) Buggy — It’s Judgment-Poor
Analysts warn that AI-generated code lacks human caution, pushing insecure logic at scale under time pressure. Automation is shipping flaws faster than QA can catch them.
👉️ Takeaway: Speed kills — enforce guardrails before your CI/CD becomes your compromise vector.
🧟♂️ Strange Cyber
🛰️ SpaceX Disables 2,500+ Starlink Kits at Myanmar Scam Compounds
Intro: A private company just took cyber-crime suppression into orbit.
What Happened: SpaceX remotely deactivated thousands of Starlink terminals operating in Myanmar scam compounds tied to human-trafficking and fraud. Reports suggest the networks used Starlink to evade national ISP blocks and maintain scam operations.
Why It’s Important: It’s the first major instance of a satellite ISP using technical control to combat criminal infrastructure, blending corporate policy with cross-border law enforcement.
The Other Side: The shutdown could impact nearby legitimate users and raises precedent questions over private control of global connectivity.
👉️ Takeaway: When connectivity becomes the weapon, the kill switch becomes the justice tool — and the ethical dilemma.
TL;DR: Starlink went vigilante; the scam lords just lost their Wi-Fi.
Further Reading: The Record coverage
Thanks for reading this week’s edition. Like what you see? Forward it!
Hate everything you see or have other feedback? Reply back to this email!


