Ultime news
NightshadeC2, the new botnet that uses unconventional methods to bypass protection
Cephalus is coming! The ransomware group that attacks via DLL replacement.
WhatsApp and Apple in emergency: DNG bug allows remote control without clicking
Stealerium and Phantom: How Open-Source Infostealers Are Taking the World by storm
The largest pirate sports streaming network has been shut down.
Criticism of XChat: The new encrypted messaging service is no good
A Threat Actors Posts Update on Luxottica’s 2021 Data Breach
Redazione RHC - July 25th, 2024
The dark side of the Windows Command Prompt: how malicious commands can replace legitimate ones
Carlo Di Dato - July 25th, 2024
RHC interviews RADAR and DISPOSSESSOR: “When it comes to security, the best defense is a good offense.”
RHC Dark Lab - July 25th, 2024
IntelBroker Strikes Again: Unauthorized Access to Two Major American Companies Up for Sale
Raffaela Crisci - July 24th, 2024
Exposed the Data of 3,379 Spanish Doctors! When Fraud Becomes “On-Target”
Redazione RHC - July 24th, 2024
The other side of cybersecurity: stress and burnout are “by design” in domain experts
Redazione RHC - July 23rd, 2024
Musk’s Supercomputer in Memphis is ready! 100,000 liquid-cooled Nvidia H1s.
Redazione RHC - July 23rd, 2024
Microsoft releases USB tool to fix CrowdStrike BSOD problem on Windows 10 and 11
Redazione RHC - July 23rd, 2024
PoC Released for SQL Injection Without Authentication on WordPress WZone Plugin
Pietro Melillo - July 19th, 2024
Threat Actor IntelBroker Exposes Rapid4Cloud Data on Breach Forums
Pietro Melillo - July 18th, 2024
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeThe cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…
CybercrimeStraiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…











