Ultime news
Jupiter, the exascale supercomputer that aims to revolutionize AI in Europe
38 million Italian phone numbers for sale on the dark web. It’s smishing!
Apitor, the first robot that helps children do their homework and the whistleblower for China
Hackable restaurant robots could serve sushi… at the attacker’s home.
LECS powered by Cyber Evolution: la prima black box NDR completamente Made in Italy
AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77
Data Brokers: How Law Enforcement Rely on Inaccurate Data to Supplement Investigations
Olivia Terragni - June 15th, 2022
The “Mother of all Demos”. Douglas Englebart’s Vision of the Future
Tara Lie - May 12th, 2022
Vannevar Bush’s Visionary Essay: “As We May Think”.
Tara Lie - May 7th, 2022
RHC ransomware Data Room – January 2022
Luca Mella - February 4th, 2022
Why privacy does not exist
Redazione RHC - December 18th, 2021
Electronic warfare between the USA, China, South and North Korea (part two)
Olivia Terragni - December 17th, 2021
North Korea’s cyberwarfare and its cyber army (part one)
Olivia Terragni - December 17th, 2021
Making the cyber world a safer and better place: an interview with W1ntermute
Olivia Terragni - November 12th, 2021
Ada Lovelace and Charles Babbage, pioneers of programmable computing
Antonio Piovesan - October 4th, 2021
Dharma/Crysis: Overview and adversary tracking
Emanuele De Lucia - September 17th, 2021
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeA group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…
CybercrimeResearchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…
CybercrimeElon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…
CultureMandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…
CybercrimeNo worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…











