Ultime news
Autonomous Warfare: China Unveils Smart Tanks That Fight Alone
A new phishing campaign on NPM involves 175 malicious packages.
We’re All in the Truman Show! Cybersecurity Lessons from Seahaven Cyber Prison
AI Alignment: Where Does AI Learn Right and Wrong?
Microsoft Patch Tuesday: 175 vulnerabilities fixed and two zero-days exploited
Microsoft warns about uncontrolled use of ‘shadow’ AI in the workplace
Open Data and Big Data: Data Management and a Comparison of Hadoop vs. Spark
Antonino Battaglia - September 3rd, 2025
Trend Micro: Beware of the “Task Scam,” the scam targeting online job seekers.
Redazione RHC - September 3rd, 2025
Palo Alto Networks Also Compromised via Salesforce and Drift
Antonio Piazzolla - September 2nd, 2025
The Battle Between OnlyFans and Google: Piracy, AI, and the Chaos of Automated Copyright
Redazione RHC - September 2nd, 2025
Was there terror on Ursula von der Leyen’s flight? Let’s clear things up!
Giovanni Pollola - September 2nd, 2025
Video Surveillance Under Attack: A Hikvision Bug Allows Admin Access Without a Login
Antonio Piazzolla - September 2nd, 2025
Nearly a third of web traffic is generated by bots! The era of invasive AI is now
Redazione RHC - September 2nd, 2025
Lazarus APT: 3 Advanced RATs for Cryptocurrency Financial Organizations
Redazione RHC - September 2nd, 2025
Zscaler Data Breach: Lessons Learned About the Evolution of SaaS Threats
Ada Spinelli - September 2nd, 2025
Zscaler Suffers Data Breach: Supply Chain Attack Via Salesloft Drift
Redazione RHC - September 2nd, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerability in the Linux kernel has caused…

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worrying security flaw in its…











