
The dark side of the Windows Command Prompt: how malicious commands can replace legitimate ones
If you choose to read this article, please note that it will not discuss a vulnerability or a bug, but rather an intended behavior of

RHC interviews RADAR and DISPOSSESSOR: “When it comes to security, the best defense is a good offense.”
In our usual underground analysis activities, we came into contact with the cyber gang DISPOSSESSOR, which came to attention in February 2024 in the cyber

IntelBroker Strikes Again: Unauthorized Access to Two Major American Companies Up for Sale
IntelBroker strikes again, announcing the sale of unauthorized access to two major American companies, each with revenues reaching hundreds of billions. This announcement was made

Exposed the Data of 3,379 Spanish Doctors! When Fraud Becomes “On-Target”
Recently, a threat actor in an underground forum called Breach Forums published an alleged data breach. The post claims to have exposed the names, departments,

The other side of cybersecurity: stress and burnout are “by design” in domain experts
We often talk about cyber security and the importance of a complete cyber program today. Today, however, we will focus on analyzing another important point

Musk’s Supercomputer in Memphis is ready! 100,000 liquid-cooled Nvidia H1s.
Elon Musk, who simultaneously heads six innovative companies-Tesla, SpaceX, Starlink, X (formerly known as Twitter), Neuralink, and xAI-is not stopping there. He recently announced that

US Elections and psy-ops: main threats come from Digital Echo Chambers and erosion of trust in democratic processes
Olivia Terragni - October 22nd, 2024
On November 5th, 2024, the next President and Vice President of the United States of America will be elected, as well as 1/3 of the U.S. Senators and all 435...

T-Space Architects Potentially Targeted by Cicada3301 in Data Broker Ransomware Attack
Inva Malaj - October 20th, 2024
London-based architectural firm T-Space Architects may find itself at the center of a significant cyberattack. The ransomware group Cicada3301 has reportedly added T-Space to its growing list of victims, threatening...

Stormous claims an attack on NASA
Pietro Melillo - October 9th, 2024
In recent years, the landscape of cyber threats has been dominated by increasingly sophisticated ransomware groups. Among them, the ransomware group Stormous has gained notoriety for targeting high-profile organizations, including...

The Story Of Conti Ransomware – Origins and Evolution of the RaaS Model (Episode 1)
Alessio Stefan - September 30th, 2024
Ransomware, a malware designed to encrypt data making them restorable only with the use of a private key. Relatively simple math is all that threat actors out there needs to...
Sign up for the newsletter