Ultime news
Red Hot Cyber Conference 2026: Sponsorships Open for the Fifth Edition in Rome
Hexstrike AI unleashes chaos! Zero-days exploited in record time
Microsoft Introduces POML for Orchestrating LLM Prompts
CISO vs. DPO: Collaboration or Cold War in Business?
Revolutionize security models with the Unified SASE framework
New blackmail: if you don’t pay, we’ll feed all your data to artificial intelligence!
UNZIPPED DATA – LEVI STRAUSS COMPROMISED ACCOUNTS
RHC Dark Lab - June 26th, 2024
LockBit: The Bluff of Double Extortion Against the Federal Reserve
RHC Dark Lab - June 26th, 2024
Xehook Stealer: The Rise and Sale of a Formidable Stealer Malware
Pietro Melillo - June 26th, 2024
DataLeak Microsoft: 4GB of Microsoft PlayReady Code Made Public!
Pietro Melillo - June 26th, 2024
Linux Kernel UAF 0-day Vulnerability on sale in the Dark Web
RHC Dark Lab - June 25th, 2024
WordPress: Five Plugins Found with Malicious Code
Pietro Melillo - June 25th, 2024
Julian Assange Free! Freedom Reclaimed After Five Years of Detention
Pietro Melillo - June 25th, 2024
BlackByte: The Return of the Gang after a few months of inactivity
Pietro Melillo - June 24th, 2024
Presumed Cyber Attack on Zerto: Not for Financial or Espionage Purposes but for Political Reasons
Pietro Melillo - June 24th, 2024
Lockbit 3.0 Claims Attack on Federal Reserve: 33 Terabytes of Sensitive Data Allegedly Compromised
Pietro Melillo - June 24th, 2024
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeThe cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…
CybercrimeStraiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…











