Ultime news
Zero-day vulnerability affecting TP-Link routers: what to know until the patch is released
Beyond espionage: “Salt Typhoon” also reportedly targeted Donald Trump
GhostRedirector: The Black SEO Redirect Campaign That Manipulates Search Engines
Windows: Security updates cause problems with UAC and app installation
Attackers are using Velociraptor for cyberattacks. Rapid7 is aware
Supercomputers: Italy ranks sixth and tenth in the 2025 TOP500 rankings.
Critical Vulnerabilities in Splunk Enterprise Enable Remote Code Execution
Pietro Melillo - July 3rd, 2024
The Reversal of the Brain Cipher Group after the Attack on Indonesia Terkoneksi
Pietro Melillo - July 3rd, 2024
New Group Ransomware ‘Pryx’ Compromises 30,000 College Enrollment Data!
Pietro Melillo - July 3rd, 2024
Intel CPUs Vulnerable! New “Indirector” Attack Threatens Sensitive Data Detection.
Raffaela Crisci - July 3rd, 2024
Threat Actors Release 2022 Electronic Arts (EA) Employee Database
Pietro Melillo - July 2nd, 2024
OpenSSH: An RCE run as Root puts 14 million instances on Linux at risk
Sandro Sana - July 2nd, 2024
Possible Data Breach of the Internal Security Operations Command (ISOC)
Pietro Melillo - July 1st, 2024
Bulgarian Hacker “Emil Külev” Arrested
Pietro Melillo - July 1st, 2024
Cybercriminals exploit ARC popularity to spread Poseidon Malware : Mac users are the target!
Raffaela Crisci - July 1st, 2024
Possible Data Breach Affecting TÜV Rheinland AG
Pietro Melillo - July 1st, 2024
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeThe cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…
CybercrimeStraiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…











