👋 Hello and welcome back to Cybersecurity Decrypted, your weekly recap of the latest cybersecurity headlines from Expert Insights. Each week, we bring you the latest news so that you can stay ahead in cybersecurity.
In the headlines this week:
Many organizations are sitting on a cybersecurity goldmine but aren’t using it. Tools like Microsoft 365 and Google Workspace offer strong security features, like Multi-Factor Authentication (MFA) and advanced email filtering, but most companies—especially small businesses—leave them switched off.
Why? Often, it’s a lack of dedicated security staff, know-how, or simply the complexity of implementation. Microsoft, for instance, has historically made more advanced controls a headache, while some providers lock premium features like Single Sign-On (SSO) behind paywalls, putting off smaller firms that are strapped for cash.
The good news? Change is coming. Microsoft announced this week that, starting in July 2025, all Microsoft 365 tenants will block access to SharePoint, OneDrive, and Office files via outdated legacy authentication protocols. This follows their February move to enforce MFA by default for all admin panel accounts. Microsoft is also stepping up security for newly provisioned and reprovisioned Windows 365 Cloud PCs with new security defaults rolling out in the second half of 2025.
But here’s the rub: Higher security defaults can add complexity and cost, especially for lean teams. There’s a debate brewing—do these measures protect or overwhelm? Still, the trend is clear: companies are increasingly raising the bar on security defaults, or at least making these controls easier to adopt. With cyberattacks on the rise, the question isn’t whether organizations can afford to strengthen their defenses—it’s whether they can afford not to.
Industry news, including funding, acquisitions and new product releases to watch this week.
Would you be interested in a weekly interested just on industry news?
AI-generated deepfakes—hyper-realistic videos, images, or audio created using deep learning and Generative Adversarial Networks (GANs)—are no longer just a Sci-Fi gimmick; they’re a serious cybersecurity menace. From impersonating CEOs in fraud schemes to spreading disinformation during elections, deepfakes are becoming increasingly common. And not only that, but they’re scarily convincing.
The risks are staggering: There are a huge number of use cases for deepfake attacks—from sending users non-consensual adult content, blackmail, and fake endorsements, to carrying out financial fraud, data breaches, reputational damage, and even instigating legal battles over consent and digital identity. We’ve likely all heard about the Arup deepfake incident, in which an employee was tricked into sending £20M GBP to cybercriminals after joining a deepfake video scam call. And in a concerning trend, we’ve heard that WhatsApp is increasingly being used as a vector to spread deepfaked voice notes of CEOs, asking for the purchase of gift cards or for employees to share MFA codes.
Countering this threat demands a multi-pronged approach. Multi-factor authentication, biometric liveness checks, and robust KYC processes can block deepfake impersonation attempts. Security Awareness Training (SAT) with behavior-based, positive-reinforcement models can help teach users to spot social engineering. We’re also seeing the emergence of AI-powered detection tools like Intel’s FakeCatcher or Google’s SynthID, but they’re locked in an arms race with ever-improving deepfake tech. And finally, we see further hope in content-tracing initiatives like C2PA.
Why it matters: The clock’s ticking. Without coordinated action from tech providers, governments, and regulators, deepfakes could erode trust in what we see and hear. As Edgar Allan Poe warned, “Believe half of what you see and nothing of what you hear,”—which has never been more relevant than now.
Read our full guide to AI deepfakes, including how malicious AI swarms may threaten democracy.
Threats and APTs
Government and Policy
Join thousands of IT leaders reading Decrypted every week.