SonicWall Confirms Active Exploitation
01
May
2025

SonicWall Confirms Active Exploitation of Flaws Affecting Multiple Appliance Models

May 01, 2025Ravie LakshmananVulnerability / VPN Security SonicWall has revealed that two now-patched security flaws impacting its SMA100 Secure Mobile…

Hijacking NodeJS' Jenkins Agents For Remote Code Execution
01
May
2025

Hijacking NodeJS’ Jenkins Agents For Remote Code Execution

Security researchers recently uncovered a critical vulnerability in Node.js’s continuous integration infrastructure that allowed attackers to execute malicious code on…

Commvault Confirms Zero-Day Attack Breached Its Azure Cloud Environment
01
May
2025

Commvault Confirms Zero-Day Attack Breached Its Azure Cloud Environment

Commvault, a global leader in data protection and information management, has confirmed that a sophisticated cyberattack involving a zero-day vulnerability…

Jane Devry
01
May
2025

Tackling the No. 1 CISO budget item with a SIEM transformation

One of the most prevalent concerns for security leaders is cost – namely, how they can work within their budget…

Why SMEs can no longer afford to ignore cyber risk
01
May
2025

Why SMEs can no longer afford to ignore cyber risk

In this Help Net Security interview, Steven Furnell, Professor of Cyber Security at the University of Nottingham, illustrates how small…

What's New & How It Helps You
01
May
2025

What’s New & How It Helps You

As we have entered Q2 2025, let’s dive into key improvements and new features introduced on the Intigriti platform in…

Researchers Leveraged OAuth Misconfiguration to Access Sensitive Data Without Restrictions
01
May
2025

Researchers Leveraged OAuth Misconfiguration to Access Sensitive Data Without Restrictions

A security researcher identified as Remy disclosed a critical vulnerability discovered during a YesWeHack bug bounty engagement. The researcher uncovered…

Naveen Goud
01
May
2025

Cyber Attack on British Co-Operative Group

The Co-Operative Group, commonly known as Co-Op, has issued an official statement confirming that some of its systems were recently…

Preparing for the next wave of machine identity growth
01
May
2025

Preparing for the next wave of machine identity growth

Machine identities are multiplying fast, and many organizations are struggling to keep up. In this Help Net Security interview, Wendy…

A view of the port in Helsinki, Finland. Photo: Shutterstock
01
May
2025

TikTok confirms plans to build €1 billion data centre in Finland

TikTok planned to invest €1 billion (US$1.14 billion) to build its first data centre in Finland as it moved data…

Anthropic Report Sheds Light on Emerging Threats from Generative AI Misuse
01
May
2025

Anthropic Report Sheds Light on Emerging Threats from Generative AI Misuse

The cybersecurity landscape faces unprecedented challenges as artificial intelligence systems become increasingly weaponized by malicious actors. A groundbreaking report released…

Tor Browser 14.5.1 Released with Enhanced Security and New Features
01
May
2025

Tor Browser 14.5.1 Released with Enhanced Security and New Features

The Tor Project has announced the official release of Tor Browser 14.5.1, introducing a host of security improvements and new…