Ultime news
Spyware yes, spyware no: it’s just a prospect! NSO Group is now under US control.
Electricians and plumbers: They are the real winners of the AI boom
Towards “legal technology”: legal education in the digital age must be technological.
ProxyCommand: The Little String That Opens a Port for Exploits
The AI bubble: fears of a new technological meltdown grow
DAS: The world’s ear hidden in submarine cables
Shocking law in Russia: searching for prohibited content on the web becomes an administrative offense.
Redazione RHC - September 1st, 2025
Managed SOC: A Strategic Choice for Corporate Cybersecurity
Redazione RHC - September 1st, 2025
Tesla under fire! The hacker hired by the victims recovers data deleted in the fatal crash.
Redazione RHC - August 31st, 2025
Fiber Computers Are Coming! E-textiles Are Coming, the Smart Fabric Revolution
Redazione RHC - August 31st, 2025
Navy and Marine Corps test hydrogen balloon and drone surveillance system
Redazione RHC - August 31st, 2025
Microsoft denies that the August update damaged SSDs: Users say otherwise.
Redazione RHC - August 31st, 2025
GitHub and GitLab are increasingly under fire! Targeted attacks targeting developers via fake repositories
Redazione RHC - August 31st, 2025
Meta’s AI bots use avatars of minors and celebrities: a storm erupts.
Redazione RHC - August 31st, 2025
Sindoor Dropper: The Malware Using the India-Pakistan Clash to Infect Linux
Redazione RHC - August 31st, 2025
Iranian cyber attacks disrupt Gaza ceasefire negotiations
Redazione RHC - August 31st, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerability in the Linux kernel has caused…

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worrying security flaw in its…











