
Inside Operation Eastwood: The Shadows of Cyberterrorism and Propaganda
The international “Eastwood” operation represents a watershed moment in the fight against cyberterrorism. For the first time, a coordinated global operation has dealt a severe
The international “Eastwood” operation represents a watershed moment in the fight against cyberterrorism. For the first time, a coordinated global operation has dealt a severe
Hackers have learned to hide malware in places where it is virtually impossible to trace: in DNS records that connect domain names to IP addresses.
With the unstoppable advance of artificial intelligence in the education system, American colleges and universities are profoundly rethinking computer science courses. The goal? To promote
A new version of the Android malware called Konfety has become even more sophisticated: specialists at Zimperium zLabs have discovered an improved variant that uses
The Linux ecosystem is once again in the spotlight, with a fork of the good old X.org taking center stage. The new project, called Xlibre,
In a new analysis based on 10 million compromised passwords, Specops has demonstrated how vulnerable corporate networks remain to human error. All passwords were extracted
As part of the investigations conducted by the Rome Public Prosecutor’s Office and coordinated by the National Anti-Mafia and Anti-Terrorism Directorate, the Postal Police has
Doxing (short for “dropping dox,” sometimes written as Doxxing) is the act of revealing personal information about someone online, such as their real name, home
The Internet provides a sea of information. We often talk on RHC about Open Source Intelligence (OSINT) and Cyber Threat Intelligence (CTI), i.e. those intelligence
Zero-day vulnerabilities are one of the greatest cybersecurity risks for organizations. These are unknown and unpatched vulnerabilities that attackers exploit to penetrate computer systems and