Ultime news
Bloody Wolf Attacks Central Asia with NetSupport RAT via Java Exploits
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
CEO Scam: How to Protect Your Company from Business Email Compromise
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
11.7% of jobs could be replaced by artificial intelligence
The market for “controlling” people is taking off on the Dark Web.
Italy and Adult Sites: The Country Where Entry Is Forbidden… But If You Click Yes, It’s Okay
Redazione RHC - November 13th, 2025
Top Malware: Flame, the modular “spy” malware targeting the Middle East.
Massimiliano Brolli - November 12th, 2025
Slammer, the first worm to use a bug that hasn’t been fixed for six months.
Redazione RHC - November 12th, 2025
The Story of the First Keylogger: How Hidden Keyboard Control Came to Be
Redazione RHC - November 12th, 2025
A Brief History of Malware: The Evolution of the Species from Its Origins to the Present Day
Redazione RHC - November 12th, 2025
What Are Large Language Models? Behind the Scenes of Artificial Intelligence
Marcello Politi - November 12th, 2025
Let’s discover the differences between a Machine Learning and Deep Learning algorithm
Marcello Politi - November 12th, 2025
Hallucination in Artificial Intelligence: Between Strange and Disturbing Errors
Simone Raponi - November 12th, 2025
How do machines learn? Let’s explore supervised, unsupervised, and reward learning approaches.
Francesco Conti - November 12th, 2025
Difference between a classical algorithm and an AI software
Simone Raponi - November 12th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeThe cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…
CybercrimeStraiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…











