Ultime news
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025
MS13-089 Ransomware: Double Extortion Without Encryption
San Francisco Power Outage Exposes Waymo Self-Driving Car Vulnerabilities
Microsoft Shifts Activation Process: What It Means for Air-Gapped Systems
PuTTY Under Siege: Hackers Exploit Popular Client for SSH Attacks
WatchGuard Firewall Zero-Day Vulnerability CVE-2025-14733 Exploited
Redazione RHC - December 19th, 2025
Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk
Redazione RHC - December 19th, 2025
Google and Apple Embrace Interoperability with Android iOS Data Transfer
Redazione RHC - December 19th, 2025
Ink Dragon Targets Europe: Exploiting SharePoint and IIS Vulnerabilities
Sandro Sana - December 19th, 2025
Bypassing AI Safety: EchoGram Exposes Vulnerabilities in LLM Defenses
Redazione RHC - December 19th, 2025
E-Note Shutdown: Major Blow to Cybercrime and Ransomware
Redazione RHC - December 19th, 2025
French Police Arrest Suspect in Cyberattack on Interior Ministry
Redazione RHC - December 18th, 2025
Google Unveils Gemini 3 Flash AI Model, Rivals OpenAI GPT-5.2
Redazione RHC - December 18th, 2025
Rise of AI Degrees: Students Shift from Computer Science to AI
Redazione RHC - December 18th, 2025
SonicWall SMA1000 Vulnerability: Critical Security Patch Released
Redazione RHC - December 18th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeStraiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…
CybercrimeAccording to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…











