Ultime news
Hackable restaurant robots could serve sushi… at the attacker’s home.
LECS powered by Cyber Evolution: la prima black box NDR completamente Made in Italy
AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77
Figure 02, the robot that loads the dishwasher with precision
If Flash is dead, here’s the SVG Assassin! Phishing 2.0 is in high definition.
The Dark Side of Windows Drivers: How to Steal Data While Ignoring EDR
Facebook Breach 2024: Sensitive User Data Up for Sale by Hacker on Breach Forums
RHC Dark Lab - July 6th, 2024
Taylor Swift’s Tour at Risk: Hacker Demands $2 Million from Ticketmaster for 170k Stolen Barcodes
Pietro Melillo - July 5th, 2024
Critical Apache Tomcat Vulnerability CVE-2024-34750 Could Bring Your Server to a Halt!
Raffaela Crisci - July 5th, 2024
Threat Actors: Alleged Data Breach of Ukraine Traffic Police
RHC Dark Lab - July 5th, 2024
Serious Vulnerability in Windows Systems: Here’s How an Attacker Can Gain Complete Control of Your PC
Alessio Stefan - July 5th, 2024
Medusa Ransomware claims responsibility for the attack on Harry Perkins Institute
Alessio Stefan - July 5th, 2024
A new potential data breach has exposed sensitive information of 70,000 users of the French amusement park Bol D’Air on BreachForum
Pietro Melillo - July 4th, 2024
Potential Data Breach: Sensitive Indonesian Data for Sale on Dark Web
Alessio Stefan - July 4th, 2024
Threat Actors Post Tennis Tournament Data Breach in Israel
RHC Dark Lab - July 4th, 2024
Threat Actors Post Data Breach of SD Biosensor Healthcare Private Limited
Pietro Melillo - July 4th, 2024
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeThe cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…
CybercrimeStraiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…











