Ultime news
Windows: Security updates cause problems with UAC and app installation
Attackers are using Velociraptor for cyberattacks. Rapid7 is aware
Supercomputers: Italy ranks sixth and tenth in the 2025 TOP500 rankings.
Underwater warfare is upon us! Will Chinese cable cutters pose a global threat?
$16 billion in stolen Apple, Meta, and Google credentials up for sale for $121,000
The European Union General Court “upholds” the transfer of personal data to the United States. For now
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeA group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…
CybercrimeResearchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…
CybercrimeElon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…
CultureMandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…
CybercrimeNo worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…

