Author: Cybernoz

What's New & How It Helps You
01
May
2025

What’s New & How It Helps You

As we have entered Q2 2025, let’s dive into key improvements and new features introduced on the Intigriti platform in…

Researchers Leveraged OAuth Misconfiguration to Access Sensitive Data Without Restrictions
01
May
2025

Researchers Leveraged OAuth Misconfiguration to Access Sensitive Data Without Restrictions

A security researcher identified as Remy disclosed a critical vulnerability discovered during a YesWeHack bug bounty engagement. The researcher uncovered…

Naveen Goud
01
May
2025

Cyber Attack on British Co-Operative Group

The Co-Operative Group, commonly known as Co-Op, has issued an official statement confirming that some of its systems were recently…

Preparing for the next wave of machine identity growth
01
May
2025

Preparing for the next wave of machine identity growth

Machine identities are multiplying fast, and many organizations are struggling to keep up. In this Help Net Security interview, Wendy…

A view of the port in Helsinki, Finland. Photo: Shutterstock
01
May
2025

TikTok confirms plans to build €1 billion data centre in Finland

TikTok planned to invest €1 billion (US$1.14 billion) to build its first data centre in Finland as it moved data…

Anthropic Report Sheds Light on Emerging Threats from Generative AI Misuse
01
May
2025

Anthropic Report Sheds Light on Emerging Threats from Generative AI Misuse

The cybersecurity landscape faces unprecedented challenges as artificial intelligence systems become increasingly weaponized by malicious actors. A groundbreaking report released…

Tor Browser 14.5.1 Released with Enhanced Security and New Features
01
May
2025

Tor Browser 14.5.1 Released with Enhanced Security and New Features

The Tor Project has announced the official release of Tor Browser 14.5.1, introducing a host of security improvements and new…

Top solutions to watch after RSAC 2025
01
May
2025

Top solutions to watch after RSAC 2025

RSAC 2025 showcased a wave of innovation, with vendors unveiling technologies poised to redefine cybersecurity. From AI-powered defense to breakthroughs…

01
May
2025

The University of Sydney revamps its contract management

The University of Sydney is planning to “overhaul six types of contracts this year” as it continues a program of…

Low-tech phishing attacks are gaining ground
01
May
2025

Low-tech phishing attacks are gaining ground

Cybercriminals are increasingly favoring low-tech, human-centric attacks to bypass email scanning technologies, according to VIPRE Security. The report is based…

Cyber Security Roadshow: Digital As Usual heads to Melbourne
01
May
2025

Cyber Security Roadshow: Digital As Usual heads to Melbourne

Following a successful launch and amazing Sydney event, Digital Nation’s Digital As Usual cyber security roadshow is now heading to…

01
May
2025

Case Study: The University of Sydney revamps its contract management

The University of Sydney is planning to “overhaul six types of contracts this year” as it continues a program of…