SonicWall OS Command Injection Vulnerability Exploited in the Wild
01
May
2025

SonicWall OS Command Injection Vulnerability Exploited in the Wild

SonicWall has issued an urgent warning to customers that threat actors are actively exploiting a high-severity command injection vulnerability in…

North Korea Stole Your Job
01
May
2025

North Korea Stole Your Job

Even security experts can be fooled. In July 2024, Knowbe4, a Florida-based company that offers security training, discovered that a…

Apache ActiveMQ Vulnerability Lets Remote Hackers Execute Arbitrary Code
01
May
2025

Apache ActiveMQ Vulnerability Lets Remote Hackers Execute Arbitrary Code

A high vulnerability in Apache ActiveMQ’s .NET Message Service (NMS) library has been uncovered, enabling remote attackers to execute arbitrary…

Hottest cybersecurity open-source tools of the month: April 2025
01
May
2025

Hottest cybersecurity open-source tools of the month: April 2025

This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. GoSearch: Open-source…

SonicWall Confirms Active Exploitation
01
May
2025

SonicWall Confirms Active Exploitation of Flaws Affecting Multiple Appliance Models

May 01, 2025Ravie LakshmananVulnerability / VPN Security SonicWall has revealed that two now-patched security flaws impacting its SMA100 Secure Mobile…

Hijacking NodeJS' Jenkins Agents For Remote Code Execution
01
May
2025

Hijacking NodeJS’ Jenkins Agents For Remote Code Execution

Security researchers recently uncovered a critical vulnerability in Node.js’s continuous integration infrastructure that allowed attackers to execute malicious code on…

Commvault Confirms Zero-Day Attack Breached Its Azure Cloud Environment
01
May
2025

Commvault Confirms Zero-Day Attack Breached Its Azure Cloud Environment

Commvault, a global leader in data protection and information management, has confirmed that a sophisticated cyberattack involving a zero-day vulnerability…

Jane Devry
01
May
2025

Tackling the No. 1 CISO budget item with a SIEM transformation

One of the most prevalent concerns for security leaders is cost – namely, how they can work within their budget…

Why SMEs can no longer afford to ignore cyber risk
01
May
2025

Why SMEs can no longer afford to ignore cyber risk

In this Help Net Security interview, Steven Furnell, Professor of Cyber Security at the University of Nottingham, illustrates how small…

What's New & How It Helps You
01
May
2025

What’s New & How It Helps You

As we have entered Q2 2025, let’s dive into key improvements and new features introduced on the Intigriti platform in…

Researchers Leveraged OAuth Misconfiguration to Access Sensitive Data Without Restrictions
01
May
2025

Researchers Leveraged OAuth Misconfiguration to Access Sensitive Data Without Restrictions

A security researcher identified as Remy disclosed a critical vulnerability discovered during a YesWeHack bug bounty engagement. The researcher uncovered…

Naveen Goud
01
May
2025

Cyber Attack on British Co-Operative Group

The Co-Operative Group, commonly known as Co-Op, has issued an official statement confirming that some of its systems were recently…