Ultime news
RHC interviews 8base: The cybergang that provides the security AUDIT report to the hacked company
Taking cyberattacks seriously: the (likely) Albanian cyber aggression and the Iranian responsibility
The History of the Unix Operating System (Part 2)
The History of the UNIX operating system (Part 1)
Hacker gang OPERA1ER stole $11 million from African companies
The Inventor of the P101 explains to us why Italy is destined to be a perennial “follower”
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeIn recent months, there has been increasing talk of a paradigm shift in cybercrime . What for years was perceived as a predominantly digital ecosystem— consisting of fraud, identity theft, online extortion, and cyberattacks —is…
CybercrimeSometimes important things don’t arrive at a press conference. They arrive like a graph that stops breathing: the connectivity line collapses, the OSINT dries up, the noise grows as the signal disappears. In Iran, the…
A critical flaw has been identified in ServiceNow’s artificial intelligence platform, with a severity score of 9.3 out of 10. This vulnerability, classified as CVE-2025-12420, could allow attackers to impersonate legitimate users without authenticating. ServiceNow…
CybercrimeInfluenza remains one of the most stubborn and unpleasant infections on the planet. It returns every winter, mutating, evading the immune system, and eventually becoming drug-resistant. Now, scientists are proposing an unexpected approach that could…
CybercrimeImagine a situation where the internet appears to be working, but websites won’t open beyond the first screen, messaging apps are intermittent, and businesses are constantly changing. According to the authors of a recent annual…

