Ultime news
Job Scams on Social Media: How to Avoid Fake Remote Job Offers
MongoDB Vulnerability CVE-2025-14847: Critical Memory Disclosure Bug
UK Boosts Subsea Cable Protection with Autonomous Vessels
China’s Humanoid Robot Industry Booms with UBtech’s Walker S2
Cyber Criminals Recruit Insiders: Companies at Risk of Internal Threats
US Data Center Battery Dependency: A Growing Concern for AI and Defense
Telegram Losing Ground to Crackdown on Cybercrime Activities
Redazione RHC - December 12th, 2025
Notepad++ Vulnerability Fixed: Update to 8.8.9 to Avoid Malware
Redazione RHC - December 11th, 2025
NetSupport RAT Malware Campaign Uncovered: Expert Analysis
Redazione RHC - December 11th, 2025
Digital Stress: How to Achieve Balance in a Hyper-Connected World
Daniela Farina - December 11th, 2025
DeadLock Ransomware Exploits Baidu Antivirus Vulnerability for EDR Bypass
Redazione RHC - December 11th, 2025
VPN Credentials on the Dark Web: A Growing Cybersecurity Threat
Redazione RHC - December 11th, 2025
Uncovering Russia’s Cyber Operations: CISM’s Role in DDoS Attacks
Redazione RHC - December 11th, 2025
Microsoft Outlook RCE Vulnerability: Update Now to Prevent Attacks
Redazione RHC - December 11th, 2025
Google Chrome Urgent Update Fixes Zero-Day Vulnerability
Redazione RHC - December 11th, 2025
EtherRAT Malware Exploits React2Shell Vulnerability with Ethereum C2
Redazione RHC - December 11th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
Cyber NewsItaly has confirmed itself as one of the main targets of the DDoS attack campaign carried out by the hacktivist group NoName057(16) . According to what was declared directly by the collective, our country has…
Cyber NewsThe question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry has repeatedly attempted to provide a concrete answer, without ever reaching a definitive solution. From…
Cyber NewsThe BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by Picus Security details the group’s…
Cyber NewsA study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The study’s results were published by…
Cyber NewsA new malware campaign has emerged in the macOS world, one that relies not on sophisticated exploits, but on good old-fashioned social engineering. It’s powered by the MacSync malware, distributed using the ” malware-as-a-service ”…












