Ultime news
CrowdStrike Threat Hunting Report 2025: Cybercriminals Use AI for Large-Scale Attacks
Apple launches Security Research Device 2026 program for security researchers
Salesloft Drift Incident Expands: Tenable Confirms Customer Data Breach
9.9 out of 10! All SAP S/4HANA systems at risk: Patch now!
Xi Jinping and the Chinese APT’s Ambition
AI needs a shrink! It can be fooled like humans.
Sale of a 0Day RCE Exploit for GLPI HelpDesk
Pietro Melillo - July 18th, 2024
Play Ransomware Claims Attack on MIPS Technologies
Pietro Melillo - July 18th, 2024
Data Breach: Personal Information of 6K NATO Employees for Sale
Pietro Melillo - July 18th, 2024
Alleged Cyber Attack on Sheba Medical Center: Israel’s Largest Hospital
Pietro Melillo - July 16th, 2024
The Hackers Choice – 30 years of hacking without trying to get rich!
Alessio Stefan - July 16th, 2024
Rockstar Games Possibly Victim of a Massive Data Leak!
Pietro Melillo - July 16th, 2024
Potential Data Leak from Google: 1 Million Records Exposed
Pietro Melillo - July 15th, 2024
Threat Actor 888 Claims Compromise of BMW (Hong Kong) Customers
Pietro Melillo - July 15th, 2024
RHC interviews Ransomcortex, the gang targeting Hospitals. “pay the ransom, we won’t even spare the CEO’s family.”
RHC Dark Lab - July 15th, 2024
Threat Actors IntelBroker Release Alleged Equifax Data on Underground Forum
RHC Dark Lab - July 13th, 2024
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeThe cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…
CybercrimeStraiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…











