Ultime news
Internet Shutdowns Cost $19.7B in 2025, Sophisticated Censorship Rises
Doom on a Smart Pressure Cooker: The Ultimate IoT Hack
LockBit 5.0 Ransomware: The Evolving Threat
Instagram Data Leak Exposes 17.5 Million Users on Dark Web
Phishing Emails Mimic Internal Comms via Microsoft 365 Spoofing
Lovense Emily AI Doll: Revolutionary Companion at CES 2026
GlassWorm Malware Targets macOS via Open VSX Extensions
Redazione RHC - January 2nd, 2026
AI Job Losses: Geoffrey Hinton Warns of Widespread Unemployment by 2026
Redazione RHC - January 2nd, 2026
NVIDIA Tegra X2 Vulnerability: Millions of Devices at Risk
Redazione RHC - January 1st, 2026
China Regulates AI Chatbots with Human-like Interaction
Redazione RHC - January 1st, 2026
The Dark Side of AI Rights: Why Experts Are Urging Caution
Redazione RHC - January 1st, 2026
EU’s Child Sexual Abuse Regulation: Balancing Safety and Digital Rights
Paolo Galdieri - January 1st, 2026
AI Systems Vulnerable to Attacks: Experts Warn of New Threats
Redazione RHC - January 1st, 2026
China Boosts AI Education with New Strategy to Prepare Students for Digital Age
Redazione RHC - December 31st, 2025
Finland Seizes Ship in Cable Damage Probe, Cites Security Threat
Redazione RHC - December 31st, 2025
Windows X-Lite 11: Optimize Your Old PC with This Lightweight Version
Redazione RHC - December 31st, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
innovationThe question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry has repeatedly attempted to provide a concrete answer, without ever reaching a definitive solution. From…
CybercrimeThe BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by Picus Security details the group’s…
CybercrimeA study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The study’s results were published by…
CybercrimeA new malware campaign has emerged in the macOS world, one that relies not on sophisticated exploits, but on good old-fashioned social engineering. It’s powered by the MacSync malware, distributed using the ” malware-as-a-service ”…
CybercrimeA sophisticated proxyjacking campaign is targeting systems in South Korea, attributed to the actor Larva-25012 , which distributes proxyware disguised as legitimate Notepad++ installers. The campaign demonstrates significant technical evolution, using process injection in explorer.exe…











