Ultime news
12 security bugs discovered in Ivanti Endpoint Manager (EPM). Update now!
A PNG containing a Trojan. Astaroth persistently abuses GitHub.
Satellites targeted! Thousands of phone conversations and text messages intercepted.
Internet Explorer is “dead,” but it continues to infect PCs with its bugs via Edge
Nanochat: Create your own LLM, train it, and get it running on your PC for $100
Jeff Bezos at Italian Tech Week: “Millions of people will live in space.”
The new cybersecurity battlefield? Your brain!
Daniela Farina - September 2nd, 2025
Wikipedia under the US Congress’s scrutiny: when freedom of expression becomes “under special surveillance”
Sandro Sana - September 2nd, 2025
From AI chatbots to global data theft: The Drift flaw rocks Google Workspace.
Redazione RHC - September 2nd, 2025
Confidentiality vs. Privacy: The Concept Everyone Confuses (and Why It’s Dangerous)
Antonino Battaglia - September 2nd, 2025
Tea Dating App Data Breach: 72,000 Images and Over 1 Million Private Messages
Stefano Gazzella - September 2nd, 2025
Artificial consciousness: abroad it’s science, in Italy it’s taboo.
Alessandro Rugolo - September 2nd, 2025
QNAP releases security patches for critical vulnerabilities in VioStor NVR systems.
Redazione RHC - September 1st, 2025
Computer engineer found dead on Microsoft campus in Mountain View
Redazione RHC - September 1st, 2025
Living-off-the-Land 2.0: When Attackers Weaponize Security Tools
Redazione RHC - September 1st, 2025
What a hacker attack! Ursula von der Leyen’s plane was the victim of an electronic warfare attack (EW)
Redazione RHC - September 1st, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerability in the Linux kernel has caused…

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worrying security flaw in its…











