Ultime news
Palo Alto Networks Also Compromised via Salesforce and Drift
The Battle Between OnlyFans and Google: Piracy, AI, and the Chaos of Automated Copyright
Was there terror on Ursula von der Leyen’s flight? Let’s clear things up!
Video Surveillance Under Attack: A Hikvision Bug Allows Admin Access Without a Login
Nearly a third of web traffic is generated by bots! The era of invasive AI is now
Lazarus APT: 3 Advanced RATs for Cryptocurrency Financial Organizations
Taking cyberattacks seriously: the (likely) Albanian cyber aggression and the Iranian responsibility
Redazione RHC - March 30th, 2023
The History of the Unix Operating System (Part 2)
Tara Lie - January 31st, 2023
The History of the UNIX operating system (Part 1)
Carlo Denza - December 28th, 2022
Hacker gang OPERA1ER stole $11 million from African companies
Redazione RHC - November 7th, 2022
The Inventor of the P101 explains to us why Italy is destined to be a perennial “follower”
Tara Lie - September 6th, 2022
RHC interviews LockBit 3.0. “The main thing is not to start a nuclear war”
Tara Lie - July 26th, 2022
The Superuser Story – The History of #root
Tara Lie - July 26th, 2022
Spacewar! The Story of the First Video Game Created by Hackers at MIT
Tara Lie - July 7th, 2022
LockBit 3.0: making the ransomware Great Again
Redazione RHC - July 6th, 2022
The Founding Fathers of the Hacker Community
Tara Lie - June 28th, 2022
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeThe cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…
CybercrimeStraiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…











