Ultime news
Microsoft Boosts BitLocker with Hardware Acceleration for Enhanced Security
DriverFixer0428: macOS Credential Stealer Linked to North Korea
A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Nezha Malware: Abusing Legitimate Tools for Remote Access
Massive Cloud Cyberespionage: PCPcat Hits 59,128 Servers in 48 Hours
Linux Foundation Launches Agentic AI Foundation with Key Tech Players
Redazione RHC - December 12th, 2025
Disney Invests $1 Billion in OpenAI for Sora Video Deal
Redazione RHC - December 12th, 2025
Microsoft 365 Okta Phishing Attack: Experts Warn of New Threat
Redazione RHC - December 12th, 2025
React Server Components Vulnerability: Update to Prevent DoS Attacks
Redazione RHC - December 12th, 2025
Critical Windows PowerShell Vulnerability CVE-2025-54100: Update Now
Redazione RHC - December 12th, 2025
Telegram Losing Ground to Crackdown on Cybercrime Activities
Redazione RHC - December 12th, 2025
Notepad++ Vulnerability Fixed: Update to 8.8.9 to Avoid Malware
Redazione RHC - December 11th, 2025
NetSupport RAT Malware Campaign Uncovered: Expert Analysis
Redazione RHC - December 11th, 2025
Digital Stress: How to Achieve Balance in a Hyper-Connected World
Daniela Farina - December 11th, 2025
DeadLock Ransomware Exploits Baidu Antivirus Vulnerability for EDR Bypass
Redazione RHC - December 11th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CultureMandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…
CybercrimeNo worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…
CybercrimeAfter a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…
CybercrimeCheck Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…











