June Cybersecurity News 2025

June Cybersecurity News 2025

What is new in June Cybersecurity News 2025?

NIST flags rising cybersecurity challenges as IT and OT systems increasingly converge through IoT integration

The U.S. National Institute of Standards and Technology (NIST) has observed in a discussion essay a growing convergence between OT (operational technology (OT) and IT, driven by the rise of the Internet of Things (IoT) and internet-connected equipment that were once isolated. OT infrastructure covers programmable systems and devices that directly interact with or control the physical environment. Covering industrial control systems (ICS), building automation, transportation networks, access control, and systems for monitoring or measuring physical conditions, these systems have longer life cycles, are sometimes difficult to access, and increasingly connect to broader networks rather than operating in isolation. Read more

Cybersecurity experts share practical advice for small businesses

Key takeaways: 

  • Small businesses benefit from the internet but must address increasing cybersecurity vulnerabilities. 
  • Cybersecurity regulations compliance, asset protection, insurability, reputation and competitive edge are all critical motivators. 
  • Cyber regulations vary; enforcement is based on factors like company size, employee count and data volume. 
  • Companies must learn to safely integrate and manage AI tools to remain competitive. 

Read more.

Windows’ Infamous ‘Blue Screen of Death’ Will Soon Turn Black

Nearly every Windows user has had a run-in with the infamous “Blue Screen of Death” at some point in their computing life. Now, after more than 40 years of being set against a very recognizable blue, the updated error message will soon be displayed across a black background. Read more

FBI, cybersecurity firms say a prolific hacking crew is now targeting airlines and the transportation sector

The FBI and cybersecurity firms are warning that the prolific hacking group known as Scattered Spider is now targeting airlines and the transportation sector.

Scattered Spider is a collective of mostly English-speaking hackers, typically teenagers and young adults, who are financially motivated to steal and extort sensitive data from company networks. The hackers are also known for their deception tactics, which often rely on social engineeringphishing, and sometimes threats of violence toward company help desks and call centers to gain access to their networks, and sometimes deploy ransomware. Read more

Only One in 10 Organizations Globally Are Ready to Protect Against AI-Augmented Cyber Threats

Accenture’s “State of Cybersecurity Resilience 2025” report is based on a survey of 2,286 cybersecurity and technology executives from large organizations around the globe. It reveals that the rapid AI adoption has dramatically accelerated the speed, scale and sophistication of cyber threats, far outpacing current enterprise cyber defenses. For example, more than three-quarters (77%) of organizations lack the essential data and AI security practices needed to protect critical business models, data pipelines and cloud infrastructure. Read more

Create a Company Culture That Takes Cybersecurity Seriously

With the damages from cybercrime growing ($16 billion in U.S. damages in 2024 alone), human error remains the leading cause of breaches—but also the greatest opportunity for improvement. Companies need to invest in building a human-centered security culture. Leaders can do so by following a three-step strategy that builds on Neidert’s Core Motives Model and Cialdini’s influence principles: (1) Connect by building trust and rapport; (2) Reduce uncertainty through modeling and peer examples; and (3) Inspire action using nudges, public commitments, and incentives. The authors emphasize that awareness alone isn’t enough—leaders must foster real behavioral change. When done right, security becomes a shared cultural norm, not just a compliance task. Read More

In order to provide you a personalized user experience, our site uses cookies.
cookie policy.

Log in

You dont have an account yet? Register Now

Search