Ultime news
Volkswagen is investing in artificial intelligence: one billion euros to reduce costs
A bug in Google Drive allows access to other people’s files on shared desktops.
Former WhatsApp employee: “1,500 engineers have access to confidential user data.”
iCloud Calendar Phishing Scam: How It Works and How to Protect Yourself
Critical BitLocker Vulnerabilities: Microsoft Patches Two Security Holes
LockBit 5.0: concrete signs of a possible rebirth?
NightSpire: A New Player in the Ransomware Landscape
Pietro Melillo - March 12th, 2025
Crazyhunter: The Ransomware with the Three-Dimensional Data Annihilation System That Redefines Data Destruction
Pietro Melillo - March 10th, 2025
Interviewing ChatGPT: the AI that feels human, to its Asperger’s users.
Ashleigh Crause - March 7th, 2025
Akira Ransomware: The New Threat Using Webcams as Entry Points
Pietro Melillo - March 7th, 2025
Possible breach at Ukraine’s Ministry of Foreign Affairs: the Qilin Ransomware group claims responsibility for the attack
Pietro Melillo - March 7th, 2025
A New Dark Actor Enters the Criminal Underground. Discovering Skira Ransomware
Pietro Melillo - March 7th, 2025
Analysis of Recorded Future’s CVE Report – February 2025
Sandro Sana - March 5th, 2025
Alleged Cyber Attack on Dana Pensiun Bank Mandiri
Redazione RHC - March 1st, 2025
Microsoft presents Majorana 1: The Quantum Processor Promising to Reshape the Future
Tara Lie - February 24th, 2025
Linkc Ransomware: The New Cybercriminal Group Targeting Artificial Intelligence Data
Pietro Melillo - February 20th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeStraiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…
CybercrimeAccording to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…











