Ultime news
DriverFixer0428: macOS Credential Stealer Linked to North Korea
A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Nezha Malware: Abusing Legitimate Tools for Remote Access
Massive Cloud Cyberespionage: PCPcat Hits 59,128 Servers in 48 Hours
Critical Net-SNMP Vulnerability Exposes Networks to RCE Attacks
Asus Hacked: Everest Ransomware Group Claims Data Breach
Redazione RHC - December 10th, 2025
Fortinet Vulnerability: Critical FortiOS, FortiWeb, FortiProxy, FortiSwitchManager Update
Redazione RHC - December 10th, 2025
Cybersecurity Certifications: Boost Your Career with CompTIA Security+
Matteo Schirinzi - December 10th, 2025
US Allows Nvidia to Sell Advanced AI Chips to China, Easing Export Restrictions
Redazione RHC - December 9th, 2025
Taiwan Cracks Down on Submarine Cable Sabotage with New Laws
Redazione RHC - December 9th, 2025
Ransomware Attacks Decline in 2024, But Threat Remains High with $734M in Ransom
Redazione RHC - December 9th, 2025
Embracing Vulnerability for Authentic Leadership and Team Growth
Daniela Linda - December 9th, 2025
CISA Warns: Avoid Personal VPNs for Secure Mobile Communications
Redazione RHC - December 9th, 2025
SAP Security Update Fixes Critical Code Injection Vulnerability in Solution Manager
Redazione RHC - December 9th, 2025
Passwordless Authentication: The Future of Secure Online Access
Redazione RHC - December 9th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
innovationThe question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry has repeatedly attempted to provide a concrete answer, without ever reaching a definitive solution. From…
CybercrimeThe BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by Picus Security details the group’s…
CybercrimeA study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The study’s results were published by…
CybercrimeA new malware campaign has emerged in the macOS world, one that relies not on sophisticated exploits, but on good old-fashioned social engineering. It’s powered by the MacSync malware, distributed using the ” malware-as-a-service ”…
CybercrimeA sophisticated proxyjacking campaign is targeting systems in South Korea, attributed to the actor Larva-25012 , which distributes proxyware disguised as legitimate Notepad++ installers. The campaign demonstrates significant technical evolution, using process injection in explorer.exe…











