Ultime news
Jaguar Land Rover victim of hacker attack: production halted!
LockBit 5.0: Signs of a New and Possible “Rebirth”?
The KING of DDoS! Cloudflare blocks a monstrous 11.5 terabit-per-second attack.
AI will grow by 50% and so will your anxiety about your electricity bill.
Cloudflare also hacked in the Salesforce incident! Cloud risks affect everyone.
Critical vulnerability in IIS Web Deploy: PoC exploit is now public
Anubi, the EDR for your malware and network security
Andrea Cavallini - June 17th, 2024
PRAISE TO VX-UNDERGROUND – The hack-library turns 5!
Alessio Stefan - May 19th, 2024
RHC interviews Professor Andrea Morello from the ARC Centre of Excellence for Quantum Computation at the University of New South Wales in Australia
Tara Lie - May 14th, 2024
ClamAV and signatures generation
Andrea Cavallini - May 2nd, 2024
Loki, starting IOC discovering
Andrea Cavallini - May 2nd, 2024
Flipping pages, from userland to godmode
Sergio Corpettini - April 6th, 2024
Likely Iranian-Origin Phishing Attack: New Threat to Online Security in Italy!
Davide Cavallini - April 4th, 2024
Hunting Hydra: ETA-W1nterSt0rm #OpChildSafety discovers a huge CSAM network
Olivia Terragni - April 2nd, 2024
Discovering the Traffic Light Protocol (TLP). How to exchange sensitive information
Antonio Piovesan - March 25th, 2024
Discover Quantum Computing
Tara Lie - March 20th, 2024
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeThe cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…
CybercrimeStraiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…











