Ultime news
Chess.com Data Breach! Free Services for Affected Users
From Commodore 64 to GitHub! Gates and Allen’s BASIC goes open source after 48 years.
New Wave of Quishing Attacks: Innovative Tactics from Cybercriminals
Netshacker: Retrogaming e Hacking Reale su Commodore 64
NotDoor Arrives: APT28’s Microsoft Outlook Backdoor
Trump meets with all the AI tech leaders at the White House. Elon Musk is notably absent!
Cyberpunk 2077: Source Code Stolen?
Pietro Melillo - June 29th, 2024
Natohub claims attack on NATO’s COI. Potential data loss of 362 members
Pietro Melillo - June 28th, 2024
Potential Data Breach Hits Traderie: Roblox Trading Platform
RHC Dark Lab - June 28th, 2024
Alleged Leak of the 2020 Israeli Voter Database
RHC Dark Lab - June 28th, 2024
TeamViewer: Irregularity Detected in Internal IT Environment
RHC Dark Lab - June 28th, 2024
RansomHub criminal hackers claim cyber attack on Coca Cola
RHC Dark Lab - June 27th, 2024
Threat Actor “DragonForce” Seeks New Partners
RHC Dark Lab - June 27th, 2024
Threat Actors 888 claimed a compromise at Credit Suisse
RHC Dark Lab - June 27th, 2024
Cyber catastrophe in sight? The new Bug on MOVEit has an Online PoC Exploit
RHC Dark Lab - June 27th, 2024
KillSec Announces New Ransomware-as-a-Service (RaaS) Platform
RHC Dark Lab - June 26th, 2024
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeThe cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…
CybercrimeStraiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…











