Ultime news
Microsoft Shifts Activation Process: What It Means for Air-Gapped Systems
PuTTY Under Siege: Hackers Exploit Popular Client for SSH Attacks
OAuth Device Code Phishing: New Attack Vector for Account Takeover
DIG AI: The Dark Web’s New AI Tool for Cybercrime
TikTok Accused of Illegally Tracking Users’ Data Across Apps
Naftali Bennett Telegram Account Hacked in Israel Politics
Gulf States’ Digital Transformation: A New Era of Innovation and Security
Matteo Giada - December 5th, 2025
Neurodivergence in Cybersecurity: A Hidden Competitive Advantage
Fabrizio Saviano - December 5th, 2025
Leroy Merlin Cyberattack Exposes Personal Data of French Customers
Redazione RHC - December 4th, 2025
Anonymity for Sale: Russian SIM Card Market Thrives Amid Regulations
Redazione RHC - December 4th, 2025
Hackers Compromise 120k IP Cameras for Pornographic Videos
Redazione RHC - December 4th, 2025
Microsoft Fixes Old Windows LNK Vulnerability Exploited in Attacks
Redazione RHC - December 4th, 2025
Critical React Server Vulnerability: Update Now to Prevent RCE Attacks
Agostino Pellegrino - December 4th, 2025
Critical Vulnerability in King Addons for Elementor Exploited
Redazione RHC - December 4th, 2025
Google Discover AI Headlines: Revolutionizing News Feed or Clickbait Nightmare?
Redazione RHC - December 4th, 2025
Storm-0900 Phishing Campaign Spreads XWorm Malware
Redazione RHC - December 4th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
Cyber NewsThe story ofIlya Lichtenstein, the hacker responsible for one of the largest cyber attacks ever carried out against cryptocurrencies, reads like an episode of a TV series, yet it is absolutely real. After being released,…
Cyber NewsItaly has confirmed itself as one of the main targets of the DDoS attack campaign carried out by the hacktivist group NoName057(16) . According to what was declared directly by the collective, our country has…
Cyber NewsThe question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry has repeatedly attempted to provide a concrete answer, without ever reaching a definitive solution. From…
Cyber NewsThe BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by Picus Security details the group’s…
Cyber NewsA study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The study’s results were published by…












