Ultime news
Asus Hacked: Everest Ransomware Group Claims Data Breach
Fortinet Vulnerability: Critical FortiOS, FortiWeb, FortiProxy, FortiSwitchManager Update
Cybersecurity Certifications: Boost Your Career with CompTIA Security+
US Allows Nvidia to Sell Advanced AI Chips to China, Easing Export Restrictions
Taiwan Cracks Down on Submarine Cable Sabotage with New Laws
Ransomware Attacks Decline in 2024, But Threat Remains High with $734M in Ransom
Phishing Attacks Surge in Black Friday Season: Stay Vigilant
Redazione RHC - December 2nd, 2025
Human Washing Machine Launched: Japan’s Science Unveils Unique Device
Redazione RHC - December 1st, 2025
Brazilian Systems Targeted in Sophisticated OAST Exploit Campaign
Redazione RHC - December 1st, 2025
Australian Man Jailed for Evil Twin Wi-Fi Scam Targeting Airline Passengers
Redazione RHC - December 1st, 2025
KrakenBite Phishing Service Exposed
Redazione RHC - December 1st, 2025
ADC Aerospace Hit by Play Ransomware Attack, Data Breach Feared
Redazione RHC - December 1st, 2025
Microsoft 365 Security Risk: Interface Poisoning Attacks
Massimiliano Dal Cero - December 1st, 2025
Calendar Subscriptions: A Hidden Danger in Your Digital Life
Redazione RHC - December 1st, 2025
Airbus A320 Recall Due to ELAC System Failure Caused by Solar Flares
Redazione RHC - December 1st, 2025
OpenAI Faces Fierce Competition from Google’s Gemini 3
Redazione RHC - December 1st, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeStraiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…
CybercrimeAccording to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…











