Ultime news
The Birth of World Wide Web: How Tim Berners-Lee Created the First Website
WatchGuard Firewall Zero-Day Vulnerability CVE-2025-14733 Exploited
Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk
Google and Apple Embrace Interoperability with Android iOS Data Transfer
Ink Dragon Targets Europe: Exploiting SharePoint and IIS Vulnerabilities
Bypassing AI Safety: EchoGram Exposes Vulnerabilities in LLM Defenses
VPN Credentials on the Dark Web: A Growing Cybersecurity Threat
Redazione RHC - December 11th, 2025
Uncovering Russia’s Cyber Operations: CISM’s Role in DDoS Attacks
Redazione RHC - December 11th, 2025
Microsoft Outlook RCE Vulnerability: Update Now to Prevent Attacks
Redazione RHC - December 11th, 2025
Google Chrome Urgent Update Fixes Zero-Day Vulnerability
Redazione RHC - December 11th, 2025
EtherRAT Malware Exploits React2Shell Vulnerability with Ethereum C2
Redazione RHC - December 11th, 2025
Is QDay approaching? QuantWare presents its 10,000-qubit quantum processor
Redazione RHC - December 10th, 2025
Ivanti Endpoint Manager Vulnerabilities: Update Now to Prevent RCE
Redazione RHC - December 10th, 2025
Malicious VSCode Extensions Steal Crypto Wallets and Browser Sessions
Redazione RHC - December 10th, 2025
Windows Cloud Files Mini Filter Vulnerability Under Active Exploitation
Redazione RHC - December 10th, 2025
The Dark Side of AI: How Technology is Being Used to Control Humans
Sandro Sana - December 10th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeWhatsApp, Meta’s messaging app with over 3 billion monthly active users, has begun introducing technical changes to mitigate several privacy vulnerabilities on user devices . The fixes, identified through independent research tools, were implemented without…
CybercrimeA recent incident saw an anonymous hacker leak a crucial security key used by Sony to safeguard the integrity of the chain of trust in the PlayStation 5 console. This security key, known as the…
CybercrimeA comparison test across six generations of Windows was conducted by YouTube channel TrigrZolt , which unexpectedly revealed a clear winner: Windows 8.1. Windows 11, on the other hand, performed worst in almost every test.…
CultureWhile the industry debates which neural network is the “smartest” and which framework is the “most modern,” decades-old technologies continue to quietly swirl beneath the surface of the banking industry . This year, COBOL turned…
CybercrimeOn Wednesday, December 31, Finnish authorities seized a cargo ship believed to be involved in the damage to an undersea telecommunications cable connecting Helsinki to Tallinn, Estonia. The action was triggered after a technical anomaly…











