Redazione RHC - January 21st, 2026
Yesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald's on their Data Leak Site (DLS) . From the gang's post, the cybercriminals claim to have 861GB of...
Redazione RHC - January 20th, 2026
A group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The...
Redazione RHC - January 20th, 2026
We had already talked about VoidLink a few days ago , it is a framework composed of over 30 modules that can be combined to meet specific attacker objectives on...
Redazione RHC - January 19th, 2026
Researchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of...
Redazione RHC - January 19th, 2026
Elon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its...
Redazione RHC - January 18th, 2026
Mandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated...
Redazione RHC - January 18th, 2026
A high-severity security vulnerability has been identified in the WordPress plugin "Modular DS (Modular Connector)," and numerous security reports suggest that this vulnerability is being exploited in real-world attacks. The...
Redazione RHC - January 18th, 2026
No worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly,...
Redazione RHC - January 17th, 2026
When it comes to cybersecurity, it's not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and...
Redazione RHC - January 17th, 2026
Since early 2025, Cisco Talos specialists have detected the activity of the UAT-8837 group, which they attribute to China based on techniques and infrastructure similar to other well-known operators in...