Ultime news
Italy among the spyware giants! A solid third place after Israel and the US.
Windows 11: Microsoft Revamps File Explorer with Artificial Intelligence
CISA launches new plan to improve CVE quality and global cyber defense
Microsoft Teams raises its defenses: real-time alerts against malicious links
Goodbye PowerShell 2.0 and WMIC! The great Windows 11 cleanup has begun.
At the Spinoza Campus in Amsterdam, 1,200 students were held hostage by washing machines.
Myth: If I use a VPN, I am completely safe even on open and unsecured WiFi networks
Redazione RHC - June 23rd, 2025
Your VPN is a Trojan! Here are 17 Free Apps Made in China That Spy on You While Google and Apple Get Fat
Redazione RHC - June 23rd, 2025
Murders Like a Drink! Dark Web Recruits Kids With Encrypted Apps in Europe
Redazione RHC - June 23rd, 2025
“Byte The Silence”: RHC’s Free Shock Comic About Cyberbullying Out Today!
Redazione RHC - June 23rd, 2025
FortiGate Under Attack: Tools for Mass Exploitation of Exposed APIs for Sale
Redazione RHC - June 23rd, 2025
Breadcrumbing: Understanding Emotional Manipulation to Better Defend Yourself in the Digital Domain
Redazione RHC - June 23rd, 2025
Connected and Vulnerable: How to Secure OT and ICS in 2025
Redazione RHC - June 22nd, 2025
Darkcloux 3.0 is here: Securonis Linux becomes more secure (and more extreme) than ever
Redazione RHC - June 22nd, 2025
Urobot watches you while you pee (but it’s for your own good)
Redazione RHC - June 22nd, 2025
Smart TV or Living Room Spies? Here’s How They’re Monitoring You
Redazione RHC - June 22nd, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeStraiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…
CybercrimeAccording to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…











