Ultime news
A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Nezha Malware: Abusing Legitimate Tools for Remote Access
Massive Cloud Cyberespionage: PCPcat Hits 59,128 Servers in 48 Hours
Critical Net-SNMP Vulnerability Exposes Networks to RCE Attacks
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Ukrainian Hacker Charged in Major Ransomware Attacks
Redazione RHC - December 23rd, 2025
The Rise of Digital Walls: How National Sovereignty Threatens Global Internet
Redazione RHC - December 23rd, 2025
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - December 23rd, 2025
Smart TV Spying: Major Brands Accused of Collecting User Data
Redazione RHC - December 23rd, 2025
Phishing Campaigns Exploit File Sharing Services
Redazione RHC - December 23rd, 2025
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Redazione RHC - December 22nd, 2025
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025
Redazione RHC - December 22nd, 2025
MS13-089 Ransomware: Double Extortion Without Encryption
Inva Malaj - December 22nd, 2025
San Francisco Power Outage Exposes Waymo Self-Driving Car Vulnerabilities
Redazione RHC - December 22nd, 2025
Microsoft Shifts Activation Process: What It Means for Air-Gapped Systems
Redazione RHC - December 22nd, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeThis article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable for its ability to generate…
CybercrimeA new report details a critical vulnerability discovered by security researcher Joseph Goydish in Apple’s WebKit engine. This security flaw, if exploited in conjunction with other exploits, could allow attackers to execute arbitrary code on…
CybercrimeWhen it comes to cybersecurity, it’s easy to fall into the trap of thinking that problems are always far away, that they only affect others. But the reality is that a vulnerability is always around…
CybercrimeFraudulent job ads promising easy money and remote work continue to flood social media, particularly in the Middle East and North Africa . Under the guise of part-time jobs that require no experience , scammers…
CybercrimeThe cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…











