Ultime news
Google pushes AI as the default search, risking blackouts for independent publishers and blogs.
Apache Jackrabbit RCE Vulnerability: Exploitation in Progress, Update Now
Italian call center companies leave all audio recordings online
Tasting the Exploit: HackerHood testa l’exploit di WINRAR CVE-2025-8088
Hackers bypass the most stringent WAFs with a single line of JavaScript! The moral? Always write securely.
Thermoptic: The Tool for Bypassing Fingerprint-Based Lock Systems
Cryptography at Risk: MIT develops a Quantum Algorithm to crack RSA.
Tara Lie - August 27th, 2024
Interview with Cesare Mencarini. A 17-year-old hacker who created a nuclear reactor in college
Massimiliano Brolli - August 26th, 2024
Arrest of Pavel Durov: Telegram Founder Detained in Paris
Pietro Melillo - August 25th, 2024
IntelBroker Takes Control of BreachForums: A New Chapter in Cybercrime Management
Pietro Melillo - August 22nd, 2024
Donald Trump’s campaign under attack! Documents and internal communications exfiltrated
Alessio Stefan - August 11th, 2024
RipperSec claims DDoS attack on Ferrari
Inva Malaj - August 11th, 2024
NSO Group targeted! BlackMeta attacks Spyware maker’s central domain
Alessio Stefan - August 4th, 2024
Echelon Stealer: The Open Source Malware
Pietro Melillo - July 31st, 2024
Ferrari avoids deepfake scam! An executive unmasks the CEO’s fake audio messages
Redazione RHC - July 29th, 2024
The Ransomware Group Ransomexx Claims Attack on Liteon
Pietro Melillo - July 26th, 2024
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeThe cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…
CybercrimeStraiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…










