Ultime news
Salesloft Drift Incident Expands: Tenable Confirms Customer Data Breach
9.9 out of 10! All SAP S/4HANA systems at risk: Patch now!
Xi Jinping and the Chinese APT’s Ambition
AI needs a shrink! It can be fooled like humans.
Telegram as a Command & Control Platform for Criminal Activities and the Role of Threat Intelligence
Houthi threat or mysterious incident? The Red Sea paralyzes Asia and the Middle East.
Discovering the Traffic Light Protocol (TLP). How to exchange sensitive information
Antonio Piovesan - March 25th, 2024
Discover Quantum Computing
Tara Lie - March 20th, 2024
How CDNs can save your website: Speed and security at the highest level
Antonio Piovesan - March 18th, 2024
Mathematics Meets Programming: A transformation journey
Davide Cavallini - March 11th, 2024
Scam Alert: How I Almost Fell for a Million-Dollar
Antonio Piovesan - March 9th, 2024
HijackLoader Expands Techniques to Improve Defense Evasion
Redazione RHC - February 22nd, 2024
The Deception of the Wallet: A Journey into the World of Scammers
Antonio Piovesan - February 16th, 2024
Ghost Exodus: the story of a hacker in a documentary that has a lot to teach
Olivia Terragni - November 29th, 2023
Signal towards the Future: Post Quantum Cryptography now protects our messages
Tara Lie - September 25th, 2023
Unveiling the Dark Secrets of Sql Injection Attacks – Learn How to Protect Your Data!
Davide Cavallini - July 26th, 2023
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeYesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald’s on their Data Leak Site (DLS) . From the gang’s post, the cybercriminals claim to have 861GB of data exfiltrated from the company’s…
CybercrimeA group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…
CybercrimeResearchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…
CybercrimeElon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…
CultureMandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…











