Ultime news
Two Ukrainians Suspected in Black Basta Ransomware Attacks
From Zero-Day Exploits to Hidden Tunnels: How UAT-8837 Operates
Gootloader Malware Returns with Enhanced Evasion Techniques
US Considers Ramping Up Cyber Offensive Ops to Counter China Threats
French Police Cyberattack Exposed: Weak Passwords Led to Data Breach
Cisco Zero-Day Vulnerability Exploited: Secure Email Gateway Under Attack
Two Ukrainians Suspected in Black Basta Ransomware Attacks
Redazione RHC - January 17th, 2026
From Zero-Day Exploits to Hidden Tunnels: How UAT-8837 Operates
Redazione RHC - January 17th, 2026
Gootloader Malware Returns with Enhanced Evasion Techniques
Redazione RHC - January 17th, 2026
US Considers Ramping Up Cyber Offensive Ops to Counter China Threats
Redazione RHC - January 17th, 2026
French Police Cyberattack Exposed: Weak Passwords Led to Data Breach
Redazione RHC - January 17th, 2026
Cisco Zero-Day Vulnerability Exploited: Secure Email Gateway Under Attack
Redazione RHC - January 16th, 2026
AWS CodeBuild Vulnerability Exposed: CodeBreach Threat Revealed
Redazione RHC - January 16th, 2026
Microsoft Patches Zero-Day NTFS Vulnerabilities in Windows 11 and Server
Redazione RHC - January 16th, 2026
AVCheck Malware Service Shut Down: Dutch Man Arrested for Cybercrime
Redazione RHC - January 16th, 2026
VoidLink Malware: Advanced Linux Framework Targets Cloud Infrastructures
Redazione RHC - January 16th, 2026
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…
CybercrimeAfter a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…
CybercrimeCheck Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…
CybercrimeA recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…
CybercrimeOn January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…











