Ultime news
From Zero-Day Exploits to Hidden Tunnels: How UAT-8837 Operates
Gootloader Malware Returns with Enhanced Evasion Techniques
US Considers Ramping Up Cyber Offensive Ops to Counter China Threats
French Police Cyberattack Exposed: Weak Passwords Led to Data Breach
Cisco Zero-Day Vulnerability Exploited: Secure Email Gateway Under Attack
AWS CodeBuild Vulnerability Exposed: CodeBreach Threat Revealed
Orion Leaks: LockBit’s Shadow in Ransomware Ecosystem
Raffaela Crisci - January 14th, 2026
Cloudflare vs Italy: The Battle for Internet Freedom and DNS Control
Redazione RHC - January 14th, 2026
Understanding Data Breach: Protecting Sensitive Information
Stefano Gazzella - January 14th, 2026
1X NEO Robot Unveils World Model for Advanced Learning
Redazione RHC - January 13th, 2026
Cybercrime Meets Real-Life Violence: Foxtrot Network’s Dark Side
Redazione RHC - January 13th, 2026
EDRStartupHinder: Bypassing Windows EDR Security with BindLink
Redazione RHC - January 13th, 2026
Burnout in Cybersecurity: The Hidden Risk to Your Organization
Paloma Donadi - January 13th, 2026
APT28 Phishing Campaign: Credential Harvesting Tactics
Lorenzo Nardi - January 13th, 2026
Iran Cyber Crisis: Connettività Compromised
Roberto Villani - January 13th, 2026
ServiceNow AI Vulnerability CVE-2025-12420: Critical Security Risk
Redazione RHC - January 13th, 2026
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeA study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The study’s results were published by…
CybercrimeA new malware campaign has emerged in the macOS world, one that relies not on sophisticated exploits, but on good old-fashioned social engineering. It’s powered by the MacSync malware, distributed using the ” malware-as-a-service ”…
CybercrimeA sophisticated proxyjacking campaign is targeting systems in South Korea, attributed to the actor Larva-25012 , which distributes proxyware disguised as legitimate Notepad++ installers. The campaign demonstrates significant technical evolution, using process injection in explorer.exe…
CybercrimeFor over a year, the North Korean group PurpleBravo has been running a targeted malware campaign called “Contagious Interview,” using fake job interviews to attack companies in Europe, Asia, the Middle East, and Central America.…
CybercrimeCheck Point Research recently discovered a sophisticated phishing campaign orchestrated by KONNI , a threat group linked to North Korea . Historically focused on diplomatic targets in South Korea, the malicious actor has now expanded…










