Ultime news
China reports 600 APT cyber attacks in 2024. Washington is in its sights.
Looking for Volodymyr Tymoshchuk! 11 million dollars for the Nefilim hacker
Microsoft warns: Critical vulnerabilities in Office! Users and admins at risk
New AD DS Vulnerability (CVE-2025-21293) Could Hand Hackers the Keys to the Entire Corporate Network
Google fights misinformation: C2PA arrives on Pixel and Photos for AI image recognition.
FlexiSPY Alert: The Easy-to-Use Spy App Can Intercept Everything, Even El Chapo
Massive Windows Crash: The OpenVPN Flaw That Can Knock Out Infrastructures
Redazione RHC - June 22nd, 2025
Android Under Attack: Godfather Malware Now Uses Virtualization to Fool Everyone
Redazione RHC - June 22nd, 2025
ChatGPT is Shutting Down Our Brains! Alarming MIT Research Shows Mental Decay
Redazione RHC - June 22nd, 2025
AKIRA emergency report: the ransomware that is breaching Italy
RHC Dark Lab - June 22nd, 2025
RHC GhostSec interview: hacktivism in the shadows of terrorism and cyber conflict
RHC Dark Lab - June 12th, 2025
Group-IB contributes to INTERPOL’s Operation Secure, leading to the arrest of 32 suspects linked to information stealer malware in Asia
Redazione RHC - June 11th, 2025
RHC Interviews NOVA Ransomware – “Expect Dangerous Attacks. No One Is Safe.” | BLACKVIEW Series
RHC Dark Lab - June 2nd, 2025
Rivendicato un databreach a Deloitte: credenziali GitHub e codice sorgente finiscono sul dark web
Luca Stivali - May 30th, 2025
Bringing Your Imagination to Life: AI-Generated Images from Your Description
Ashleigh Crause - May 14th, 2025
Apple in the crosshairs: alleged data breach of the Cupertino giant published on XSS
Redazione RHC - May 14th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeStraiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…
CybercrimeAccording to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…











