Ultime news
Microsoft Azure OAuth Attack: ConsentFix Malware Steals Accounts
Linux Foundation Launches Agentic AI Foundation with Key Tech Players
Disney Invests $1 Billion in OpenAI for Sora Video Deal
Microsoft 365 Okta Phishing Attack: Experts Warn of New Threat
React Server Components Vulnerability: Update to Prevent DoS Attacks
Critical Windows PowerShell Vulnerability CVE-2025-54100: Update Now
TamperedChef: Malware via Fake App Installers
Redazione RHC - November 21st, 2025
Whoever took down Cloudflare during the outage put their infrastructure at risk
Redazione RHC - November 21st, 2025
Critical Vulnerability in Azure Bastion Scores 10! When RDP and SSH in the Cloud Are Checkmated
Redazione RHC - November 21st, 2025
Risk averted for millions of Microsoft users! The critical vulnerability in Microsoft SharePoint 9.8
Redazione RHC - November 21st, 2025
Sturnus, the banking Trojan that intercepts WhatsApp, Telegram, and Signal messages
Redazione RHC - November 21st, 2025
Disloyal Employees: Fired, Returns to Work, and Resets 2,500 Passwords Without the Company’s Knowledge
Redazione RHC - November 21st, 2025
MONOLOCK: The new “silent” ransomware group that rejects leak sites and affiliate panels.
Luca Stivali - November 21st, 2025
Critical vulnerability in the WordPress plugin W3 Total Cache. 430,000 sites at risk!
Redazione RHC - November 21st, 2025
Hundreds of robots on the march: China presents the new generation of humanoids
Redazione RHC - November 21st, 2025
Veeam launches Data Platform v13, redefining the standard for cyber resilience and advanced data protection.
Redazione RHC - November 20th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
Cyber NewsThe story ofIlya Lichtenstein, the hacker responsible for one of the largest cyber attacks ever carried out against cryptocurrencies, reads like an episode of a TV series, yet it is absolutely real. After being released,…
Cyber NewsItaly has confirmed itself as one of the main targets of the DDoS attack campaign carried out by the hacktivist group NoName057(16) . According to what was declared directly by the collective, our country has…
Cyber NewsThe question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry has repeatedly attempted to provide a concrete answer, without ever reaching a definitive solution. From…
Cyber NewsThe BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by Picus Security details the group’s…
Cyber NewsA study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The study’s results were published by…












