Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Controversial Firms Cellebrite and Corellium Announce $200 Million Acquisition Deal

Posted on June 5, 2025June 5, 2025 By CWS

Israel-based forensic investigation options supplier Cellebrite introduced on Thursday an settlement to accumulate US-based virtualization software program agency Corellium in a $200 million deal.

Cellebrite gives governments and different organizations with instruments that allow the extraction and evaluation of information from cell gadgets and computer systems. Corellium has developed system virtualization options for cell safety analysis, cell app testing, and IoT system modeling.

By becoming a member of forces, the 2 corporations purpose to supply prospects within the public security, intelligence, protection and personal sectors with superior options for the identification of cell vulnerabilities and exploits, instruments for visualizing and interacting with digital gadgets as in the event that they have been actual, enhanced DevSecOps options, and cell pen testing.

Cellebrite has agreed to accumulate Corellium for $170 million in money, with $20 million transformed to fairness at closing. Cellebrite can also be ready to pay as much as an extra $30 million in money over the subsequent two years if sure efficiency milestones are achieved. 

Each corporations have been on the heart of controversy in recent times. Cellebrite’s cell forensic instruments have made headlines for the exploitation of zero-day vulnerabilities as a part of spyware and adware campaigns. 

Corellium was sued by Apple in 2019 for copyright infringement over its product replicating the iOS cell working system. A US appeals court docket sided with Corellium in Might 2023 and by the tip of the identical yr the 2 corporations reached a confidential settlement. 

Paperwork shared by Apple as a part of the lawsuit confirmed that Corellium engaged with some controversial corporations resembling spyware and adware maker NSO Group.

Associated: Proofpoint to Purchase Hornetsecurity in Reported $1 Billion DealAdvertisement. Scroll to proceed studying.

Associated: Cybersecurity M&A Roundup: 31 Offers Introduced in April 2025

Associated: Palo Alto Networks to Purchase AI Safety Agency Shield AI

Security Week News Tags:Acquisition, Announce, Cellebrite, Controversial, Corellium, Deal, Firms, Million

Post navigation

Previous Post: Men Who Hacked Law Enforcement Database for Doxing Sentenced to Prison
Next Post: Backdoored Open Source Malware Repositories Target Novice Cybercriminals

Related Posts

SonicWall Patches Critical SMA 100 Vulnerability, Warns of Recent Malware Attack Security Week News
Nippon Steel Subsidiary Blames Data Breach on Zero-Day Attack Security Week News
Cloudflare Tunnels Abused in New Malware Campaign Security Week News
Mirai Botnets Exploiting Wazuh Security Platform Vulnerability  Security Week News
Security Theater or Real Defense? The KPIs That Tell the Truth Security Week News
Marketing, Law Firms Say Data Breaches Impact Over 200,000 People Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Remove Your Data From Data Broker Sites
  • TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands
  • SharePoint 0-day Vulnerability Exploited in Wild by All Sorts of Hacker Groups
  • Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems
  • Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Remove Your Data From Data Broker Sites
  • TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands
  • SharePoint 0-day Vulnerability Exploited in Wild by All Sorts of Hacker Groups
  • Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems
  • Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News