U.S. Offers $10M Bounty for Information on RedLine Malware Creator
06
Jun
2025

U.S. Offers $10M Bounty for Information on RedLine Malware Creator

The US State Department has announced a reward of up to $10 million for information leading to the identification or…

NICKNAME: Zero-Click iMessage Exploit Targeted Key Figures in US, EU
06
Jun
2025

Zero-Click iMessage Exploit Targeted Key Figures in US, EU

iVerify’s NICKNAME discovery reveals a zero-click iMessage flaw exploited in targeted attacks on US & EU high-value individuals including political…

HPE Insight Remote Support Vulnerability Let Attackers Execute Remote Code
06
Jun
2025

HPE Insight Remote Support Vulnerability Let Attackers Execute Remote Code

Multiple severe security vulnerabilities in HPE Insight Remote Support (IRS) platform that could allow attackers to execute remote code, traverse…

BADBOX 2.0 Malware Hits Over a Million Android Devices in Global Cyber Threat
06
Jun
2025

BADBOX 2.0 Malware Hits Over a Million Android Devices in Global Cyber Threat

HUMAN’s Satori Threat Intelligence and Research team, in collaboration with Google, Trend Micro, and Shadowserver, has uncovered and partially disrupted…

Huge Market Opportunity for MSPs
06
Jun
2025

Huge Market Opportunity for MSPs

“Cybercrime is rising and SMBs rely on MSPs to provide the security tools and services they can’t staff or build themselves,”…

Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
06
Jun
2025

Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?

Millions of Internet-of-Things (IoT) devices running the open-source version of the Android operating system are part of the Badbox 2.0…

CISOs
06
Jun
2025

Why Government CISOs Are Near Breaking Point

In a time when digital transformation is the backbone of public services, Chief Information Security Officers (CISOs) in government and…

NCSC Cyber Security Culture Iceberg
06
Jun
2025

NCSC’s 6 Principles To Build Strong Cybersecurity Culture

The UK’s National Cyber Security Centre (NCSC) has introduced a set of six core principles to help organizations embed strong…

2025 cybersecurity M&A
06
Jun
2025

Cybersecurity M&A Roundup: 42 Deals Announced in May 2025

The number of cybersecurity-related merger and acquisition (M&A) announcements surged in May 2025, with 42 deals. An analysis conducted by…

US to Offer $10 Million Reward for Details About RedLine Malware Developer
06
Jun
2025

US to Offer $10 Million Reward for Details About RedLine Malware Developer

The United States Department of State’s Rewards for Justice program has announced a substantial bounty of up to $10 million…

Critical RCE Vulnerability in AWS Amplify Studio – PoC Now Public
06
Jun
2025

Critical RCE Vulnerability in AWS Amplify Studio – PoC Now Public

In May 2025, AWS disclosed a critical remote code execution (RCE) vulnerability, CVE-2025-4318, in the @aws-amplify/codegen-ui package—a core dependency for…

UK ICO publishes AI and biometrics strategy
06
Jun
2025

UK ICO publishes AI and biometrics strategy

The UK Information Commissioner’s Office (ICO) has launched an artificial intelligence (AI) and biometrics strategy, which the regulator says will…