Ultime news
But what kind of Sovereign AI is running on the servers and algorithms of a US company!
Rootkit on Cisco Devices: Operation Zero Disk Discovered
Australia targeted by Chinese hackers: New intelligence report revealed
Flirt, eroticism, and the end of censorship! OpenAI will change the rules of ChatGPT.
Harvard University Hit by Hacking Campaign Using Oracle E-Business Suite
“Double Bind” Leads to GPT-5 Jailbreak: The AI That Was Convinced It Was Schizophrenic
New blackmail: if you don’t pay, we’ll feed all your data to artificial intelligence!
Redazione RHC - September 3rd, 2025
Jaguar Land Rover victim of hacker attack: production halted!
Redazione RHC - September 3rd, 2025
LockBit 5.0: Signs of a New and Possible “Rebirth”?
Pietro Melillo - September 3rd, 2025
The KING of DDoS! Cloudflare blocks a monstrous 11.5 terabit-per-second attack.
Redazione RHC - September 3rd, 2025
AI will grow by 50% and so will your anxiety about your electricity bill.
Redazione RHC - September 3rd, 2025
Cloudflare also hacked in the Salesforce incident! Cloud risks affect everyone.
Redazione RHC - September 3rd, 2025
Critical vulnerability in IIS Web Deploy: PoC exploit is now public
Redazione RHC - September 3rd, 2025
Tencent Challenges the Giants! New Hunyuan-MT Beats Google Translate and GPT-4.1
Redazione RHC - September 3rd, 2025
OpenAI Puts Parents in Control: Parental Controls Arrive on ChatGPT
Redazione RHC - September 3rd, 2025
Lovable, the Swedish AI unicorn that’s revolutionizing programming
Redazione RHC - September 3rd, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerability in the Linux kernel has caused…

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worrying security flaw in its…











