Ultime news
Prelude to Compromise: Targeted Scans of Cisco ASA Surge
tls-preloader introduced: the library that disables TLS certificate verification
Rogue TLS certificates discovered for Cloudflare’s DNS service 1.1.1.1
Urgent update for Google Chrome: Use-after-free in the Serviceworker component
Cyberstorage: Italian IT Managers’ Response to Ransomware
The Gentlemen Ransomware: An Emerging Dark Web Threat Analysis
How Threat Actor make EDR’s harmless with a reboot
Alex Necula - November 22nd, 2024
The Story Of Conti Ransomware – The War Within (Episode 2)
Alessio Stefan - November 22nd, 2024
IntelBroker Claims Tesla Charging Database Breach
Redazione RHC - November 20th, 2024
Interview with Luca Cadonici: computer and mobile forensics towards a proactive approach against cybercrime
Olivia Terragni - November 11th, 2024
Potential Compromise of a U.S. Military Database
Pietro Melillo - November 6th, 2024
Hellcat Claims an Alleged Breach Against Schneider Electric
Pietro Melillo - November 4th, 2024
Herm1t Interview – From VX Heaven to the war gates!
Alessio Stefan - November 4th, 2024
Israeli Air Force Data Sale: A Suspected Leak Puts Sensitive Information at Risk
Pietro Melillo - November 2nd, 2024
IBM Hacked? Threat Actor ‘888’ Reveals Thousands of Employees’ Data Leak!
Luca Galuppi - October 31st, 2024
Fortinet Issues Bulletin for Critical 9.8 Bug on FortiManager under Active Exploitation
Redazione RHC - October 24th, 2024
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeStraiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…
CybercrimeAccording to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…











