Ultime news
Critical vulnerability in Adobe Commerce and Magento: the SessionReaper bug
Phishing in the Classroom! 115,000 emails targeted 13,500 organizations with Google Classroom.
6 million euros a day! That’s the cost of the cyber attack on Jaguar Land Rover.
Microsoft Patch Tuesday for September: 81 vulnerabilities and 2 active 0days
10 out of 10! SAP releases security patches for critical vulnerabilities in NetWeaver.
Towards the Ouroboros! OpenAI CEO warns: Social media is full of AI bot content.
The UK’s Digital Crackdown: how the government is using our online habits to breach human rights
Ashleigh Crause - February 12th, 2025
Ransomware Gangs weaponize Windows Defender Application Control (WDAC) to disable EDR products.
Alex Necula - January 13th, 2025
The Story Of Conti Ransomware – The Last Ceremony (Final Episode)
Alessio Stefan - January 8th, 2025
The Fall of the Human Conscience: Programming Desensitization
Olivia Terragni - January 4th, 2025
Harley-Davidson Targeted by Cyber Criminals: 888 Claims Data Breach
RHC Dark Lab - December 31st, 2024
FBI responds to threats and announcement of LockBit 4.0
Alessio Stefan - December 22nd, 2024
Brain Chiper claims computer attack on Deloitte. 1 Tera Byte of data
Luca Stivali - December 4th, 2024
The Exploit for the RCE on Palo Alto Firewalls is now Online! And let the Administration be for all
Luca Stivali - December 3rd, 2024
RHC DarkLab Interviews Interlock Ransomware. “Don’t waste your energy and time. We will do it for you.”
RHC Dark Lab - December 2nd, 2024
RHC DarkLab Interview Stormous Ransomware. Between history, ideology, techniques and tactics
Redazione RHC - November 24th, 2024
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeStraiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…
CybercrimeAccording to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…











