Ultime news
Massive Cloud Cyberespionage: PCPcat Hits 59,128 Servers in 48 Hours
Critical Net-SNMP Vulnerability Exposes Networks to RCE Attacks
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Australia Boosts Papua New Guinea’s Digital Infra with New Undersea Cable
China Issues First Level 3 Autonomous Driving Licenses, Paving Way for Self-Driving Cars
Nvidia H200 Chip Shipments to China Set to Begin
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - December 23rd, 2025
Ukrainian Hacker Charged in Major Ransomware Attacks
Redazione RHC - December 23rd, 2025
The Rise of Digital Walls: How National Sovereignty Threatens Global Internet
Redazione RHC - December 23rd, 2025
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - December 23rd, 2025
Smart TV Spying: Major Brands Accused of Collecting User Data
Redazione RHC - December 23rd, 2025
Phishing Campaigns Exploit File Sharing Services
Redazione RHC - December 23rd, 2025
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Redazione RHC - December 22nd, 2025
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025
Redazione RHC - December 22nd, 2025
MS13-089 Ransomware: Double Extortion Without Encryption
Inva Malaj - December 22nd, 2025
San Francisco Power Outage Exposes Waymo Self-Driving Car Vulnerabilities
Redazione RHC - December 22nd, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeThe cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…
CybercrimeStraiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…











