Ultime news
Smart TV Spying: Major Brands Accused of Collecting User Data
Phishing Campaigns Exploit File Sharing Services
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025
MS13-089 Ransomware: Double Extortion Without Encryption
San Francisco Power Outage Exposes Waymo Self-Driving Car Vulnerabilities
React2Shell Vulnerability Exploited by China-Linked Hackers, Patch Now
Agostino Pellegrino - December 6th, 2025
FreeBSD 15.0: Discover the Power of This Unix-like Operating System
Redazione RHC - December 6th, 2025
Cloudflare Blocks AI Bots: The Future of Internet Economy at Stake
Redazione RHC - December 5th, 2025
React2Shell Vulnerability: 8.7M Servers at Risk – CVE-2025-55182
Agostino Pellegrino - December 5th, 2025
Cloudflare Just Broke the Internet… Again. Centralization Risks Exposed
Redazione RHC - December 5th, 2025
Chinese Cyber Spies Use Brickstorm Malware to Infiltrate Critical Networks
Redazione RHC - December 5th, 2025
Splunk Enterprise Vulnerability: CVE-2025-20386 and CVE-2025-20387
Agostino Pellegrino - December 5th, 2025
Apache HTTP Server Update Fixes Critical Security Vulnerabilities
Redazione RHC - December 5th, 2025
Cyber Insurance: Why Basic Hygiene Matters
Redazione RHC - December 5th, 2025
Meta AI WhatsApp Investigation
Redazione RHC - December 5th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
Cyber NewsThe story ofIlya Lichtenstein, the hacker responsible for one of the largest cyber attacks ever carried out against cryptocurrencies, reads like an episode of a TV series, yet it is absolutely real. After being released,…
Cyber NewsItaly has confirmed itself as one of the main targets of the DDoS attack campaign carried out by the hacktivist group NoName057(16) . According to what was declared directly by the collective, our country has…
Cyber NewsThe question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry has repeatedly attempted to provide a concrete answer, without ever reaching a definitive solution. From…
Cyber NewsThe BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by Picus Security details the group’s…
Cyber NewsA study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The study’s results were published by…











