Ultime news
Hacker culture pioneer Peter Samson plays “Boards of Canada” on PDP-1
Crimson Collective claims alleged Nintendo hack: bluff or real breach?
Critical vulnerabilities in Microsoft Defender for Endpoint: security risks
Between AI and fear, Skynet teaches: “We’ll build bunkers before launching AGI.”
GitHub is migrating to Azure! And goodbye to new development for a year.
China dominates industrial robotics: 2 million machines in factories
Let the hunt begin! Hackers exploit Citrix flaw to infiltrate global systems
Redazione RHC - August 30th, 2025
The Pentagon launches an audit of Microsoft. It investigates Chinese engineers and alleged backdoors.
Redazione RHC - August 30th, 2025
Amazon Stops APT29: Sophisticated Russian Watering Hole Campaign Foiled
Redazione RHC - August 30th, 2025
The best defense is a good offense! Google is ready to launch cyber attacks against criminal hackers.
Redazione RHC - August 30th, 2025
A zero-click exploit for WhatsApp allowed remote surveillance. Meta warns victims.
Redazione RHC - August 30th, 2025
Google warns 2.5 billion Gmail users: account security at risk. Reset your password!
Redazione RHC - August 30th, 2025
Moscow hires hackers who attacked the Electronic School in 2022 to improve it
Redazione RHC - August 30th, 2025
Want a free PDF editor? You downloaded malware included in the premium package.
Redazione RHC - August 30th, 2025
Critical vulnerabilities are on the rise! Awareness, Patching, and Audits are key.
Redazione RHC - August 30th, 2025
Iran Cyber Army: Spear-phishing attacks against governments around the world (including Italy!)
Redazione RHC - August 29th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerability in the Linux kernel has caused…

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worrying security flaw in its…











