Ultime news
Elon Musk Sues OpenAI for $134 Billion Over AI Betrayal
Net-NTLMv1 Exploitation: Rainbow Tables for Modern Attacks
Critical Vulnerability in Modular DS WordPress Plugin – Update Now
Your paycheck is zero! Congratulations, someone answered the phone wrong
Two Ukrainians Suspected in Black Basta Ransomware Attacks
From Zero-Day Exploits to Hidden Tunnels: How UAT-8837 Operates
Elon Musk Sues OpenAI for $134 Billion Over AI Betrayal
Redazione RHC - January 19th, 2026
Net-NTLMv1 Exploitation: Rainbow Tables for Modern Attacks
Redazione RHC - January 18th, 2026
Critical Vulnerability in Modular DS WordPress Plugin – Update Now
Redazione RHC - January 18th, 2026
Your paycheck is zero! Congratulations, someone answered the phone wrong
Redazione RHC - January 18th, 2026
Two Ukrainians Suspected in Black Basta Ransomware Attacks
Redazione RHC - January 17th, 2026
From Zero-Day Exploits to Hidden Tunnels: How UAT-8837 Operates
Redazione RHC - January 17th, 2026
Gootloader Malware Returns with Enhanced Evasion Techniques
Redazione RHC - January 17th, 2026
US Considers Ramping Up Cyber Offensive Ops to Counter China Threats
Redazione RHC - January 17th, 2026
French Police Cyberattack Exposed: Weak Passwords Led to Data Breach
Redazione RHC - January 17th, 2026
Cisco Zero-Day Vulnerability Exploited: Secure Email Gateway Under Attack
Redazione RHC - January 16th, 2026
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeElon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…
CultureMandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…
CybercrimeNo worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…
CybercrimeAfter a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…











