Ultime news
Bloody Wolf Attacks Central Asia with NetSupport RAT via Java Exploits
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
CEO Scam: How to Protect Your Company from Business Email Compromise
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
11.7% of jobs could be replaced by artificial intelligence
The market for “controlling” people is taking off on the Dark Web.
A Brief History of Malware: The Evolution of the Species from Its Origins to the Present Day
Redazione RHC - November 12th, 2025
What Are Large Language Models? Behind the Scenes of Artificial Intelligence
Marcello Politi - November 12th, 2025
Let’s discover the differences between a Machine Learning and Deep Learning algorithm
Marcello Politi - November 12th, 2025
Hallucination in Artificial Intelligence: Between Strange and Disturbing Errors
Simone Raponi - November 12th, 2025
How do machines learn? Let’s explore supervised, unsupervised, and reward learning approaches.
Francesco Conti - November 12th, 2025
Difference between a classical algorithm and an AI software
Simone Raponi - November 12th, 2025
What is a neural network? Discover the technology behind artificial intelligence.
Simone Raponi - November 12th, 2025
Discovering Sandworm: The Kremlin’s National State Group
Redazione RHC - November 12th, 2025
Discovering DarkSide: Techniques, Tactics, and Affiliations
Redazione RHC - November 12th, 2025
Salt Typhoon (RedMike): The Chinese Cyber Threat That’s Shaking the World
RHC Dark Lab - November 12th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeFraudulent job ads promising easy money and remote work continue to flood social media, particularly in the Middle East and North Africa . Under the guise of part-time jobs that require no experience , scammers…
CybercrimeThe cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…
CybercrimeStraiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…











