Ultime news
ChatGPT to Introduce Targeted Ads, Changing Monetization Strategy
GitLab Security Updates Fix High-Severity Vulnerabilities CVE-2024-9183
Apache SkyWalking Vulnerability Exposes Users to XSS Attacks
Bloody Wolf Attacks Central Asia with NetSupport RAT via Java Exploits
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
CEO Scam: How to Protect Your Company from Business Email Compromise
The Queen of Cryptocurrency Has Been Captured! She Stole $7 Billion in Bitcoin
Redazione RHC - November 13th, 2025
Cyber Sabotage Alert: Volt Typhoon Prepares for Destructive Activities
Redazione RHC - November 13th, 2025
Microsoft fixes 63 vulnerabilities, including an actively exploited zero-day
Redazione RHC - November 13th, 2025
Italy and Adult Sites: The Country Where Entry Is Forbidden… But If You Click Yes, It’s Okay
Redazione RHC - November 13th, 2025
Top Malware: Flame, the modular “spy” malware targeting the Middle East.
Massimiliano Brolli - November 12th, 2025
Slammer, the first worm to use a bug that hasn’t been fixed for six months.
Redazione RHC - November 12th, 2025
The Story of the First Keylogger: How Hidden Keyboard Control Came to Be
Redazione RHC - November 12th, 2025
A Brief History of Malware: The Evolution of the Species from Its Origins to the Present Day
Redazione RHC - November 12th, 2025
What Are Large Language Models? Behind the Scenes of Artificial Intelligence
Marcello Politi - November 12th, 2025
Let’s discover the differences between a Machine Learning and Deep Learning algorithm
Marcello Politi - November 12th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeThe cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…
CybercrimeStraiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…











