The US State Department has announced a reward of up to $10 million for information leading to the identification or…
iVerify’s NICKNAME discovery reveals a zero-click iMessage flaw exploited in targeted attacks on US & EU high-value individuals including political…
Multiple severe security vulnerabilities in HPE Insight Remote Support (IRS) platform that could allow attackers to execute remote code, traverse…
HUMAN’s Satori Threat Intelligence and Research team, in collaboration with Google, Trend Micro, and Shadowserver, has uncovered and partially disrupted…
“Cybercrime is rising and SMBs rely on MSPs to provide the security tools and services they can’t staff or build themselves,”…
Millions of Internet-of-Things (IoT) devices running the open-source version of the Android operating system are part of the Badbox 2.0…
In a time when digital transformation is the backbone of public services, Chief Information Security Officers (CISOs) in government and…
The UK’s National Cyber Security Centre (NCSC) has introduced a set of six core principles to help organizations embed strong…
The number of cybersecurity-related merger and acquisition (M&A) announcements surged in May 2025, with 42 deals. An analysis conducted by…
The United States Department of State’s Rewards for Justice program has announced a substantial bounty of up to $10 million…
In May 2025, AWS disclosed a critical remote code execution (RCE) vulnerability, CVE-2025-4318, in the @aws-amplify/codegen-ui package—a core dependency for…
The UK Information Commissioner’s Office (ICO) has launched an artificial intelligence (AI) and biometrics strategy, which the regulator says will…











