Ultime news
WhatsApp Web in the crosshairs! How the worm that distributes the banking Trojan works
Goodbye Microsoft Word. China chooses WPS Office for official documents
RMPocalypse: A critical bug in AMD SEV-SNP threatens cloud security.
Poisoned AI! 250 Malicious Documents Are Enough to Compromise an LLM
Spyware yes, spyware no: it’s just a prospect! NSO Group is now under US control.
Electricians and plumbers: They are the real winners of the AI boom
BruteForceAI: When AI Learns to Hack Logins Better Than a Human Hacker
Redazione RHC - September 1st, 2025
Critical Linux Vulnerability: CVSS 8.5 Vulnerability Discovered in UDisks Daemon
Redazione RHC - September 1st, 2025
Transparency and Resilience: NIST Publishes Meta-Framework to Change Supply Chain Management
Redazione RHC - September 1st, 2025
LilyGO T-Embed CC1101 and Bruce Firmware, the community makes studying Rolling Code possible
Diego Bentivoglio - September 1st, 2025
New AI-powered stethoscope now delivers cardiac diagnoses in 15 seconds
Redazione RHC - September 1st, 2025
WhatsApp wins $167 million lawsuit against NSO and its Pegasus spyware
Redazione RHC - September 1st, 2025
IBM and AMD Create New Architectures Between Quantum Computing and High-Performance Computing (HPC)
Redazione RHC - September 1st, 2025
DarkMirror H1 2025 Released: Dark Lab’s Ransomware Threat Report
Redazione RHC - September 1st, 2025
Shocking law in Russia: searching for prohibited content on the web becomes an administrative offense.
Redazione RHC - September 1st, 2025
Managed SOC: A Strategic Choice for Corporate Cybersecurity
Redazione RHC - September 1st, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerability in the Linux kernel has caused…

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worrying security flaw in its…











