Ultime news
Underwater warfare is upon us! Will Chinese cable cutters pose a global threat?
$16 billion in stolen Apple, Meta, and Google credentials up for sale for $121,000
The European Union General Court “upholds” the transfer of personal data to the United States. For now
Android Colabrodo Edition: 120 vulnerabilities and two zero-days fixed
Chess.com Data Breach! Free Services for Affected Users
From Commodore 64 to GitHub! Gates and Allen’s BASIC goes open source after 48 years.
Juniper Networks Releases Security Updates for a Critical 10.0 Vulnerability
Pietro Melillo - July 1st, 2024
Allegedly Data Breach: Kemenkumham Email Credentials Compromised
Pietro Melillo - July 1st, 2024
Coinbase USA: Threat Actor Claims to Sell Database of 600,000 Users
Pietro Melillo - July 1st, 2024
A Brief History of Artificial Intelligence: From Alan Turing to Generative AI
Redazione RHC - June 30th, 2024
The Virginia Department of Elections database may have been hacked and is online on the dark web
Pietro Melillo - June 30th, 2024
Vietnam Hong Ngoc Hospital on Breach Forums: 112,621 Patient and Doctor Profiles Compromised
Pietro Melillo - June 30th, 2024
Cambridge University Press & Assessment Ends Up in the DLS of INC Ransomware
Pietro Melillo - June 29th, 2024
Identified a POC for the CVE-2024-34102 Vulnerability in Magento / Adobe Commerce
Pietro Melillo - June 29th, 2024
Cyberpunk 2077: Source Code Stolen?
Pietro Melillo - June 29th, 2024
Natohub claims attack on NATO’s COI. Potential data loss of 362 members
Pietro Melillo - June 28th, 2024
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeThe cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…
CybercrimeStraiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…











