Ultime news
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Anthropic Releases Claude Opus 4.5: AI Model for Enhanced Productivity
Alibaba Qwen3Max Dominates AI Market with Rapid Growth
Digital Surveillance at Work: The Rise of Algorithmic Monitoring
Windows Server Vulnerability Exploited: ShadowPad Malware Deployed
Salesforce Data Breach: ShinyHunters Hack Gainsight Integration
2 critical bugs detected on Cisco Unified Contact Center Express (CCX)
Redazione RHC - November 7th, 2025
China is using artificial intelligence to improve mass surveillance
Redazione RHC - November 6th, 2025
Microsoft apologizes to 3 million Australian users for unfair business practices
Redazione RHC - November 6th, 2025
Cisco Addresses Critical Vulnerabilities in ASA and Unified Contact Center Express
Redazione RHC - November 6th, 2025
Rust Rebels! Fund Launched to Pay Open Source Maintainers
Redazione RHC - November 6th, 2025
12.5 million HD movies per second! Amazon’s undersea cable will connect the US to Ireland.
Redazione RHC - November 6th, 2025
SMTP Posts Actively Exploited: 400,000 WordPress Sites at Risk
Redazione RHC - November 6th, 2025
They told you 6G would be fast, right? But they didn’t tell you the whole truth
Sandro Sana - November 6th, 2025
Cyberattacks against public applications are increasing. Cisco’s report
Redazione RHC - November 6th, 2025
Epic vs. Google: Historic Agreement for App Developers
Redazione RHC - November 6th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeA comparison test across six generations of Windows was conducted by YouTube channel TrigrZolt , which unexpectedly revealed a clear winner: Windows 8.1. Windows 11, on the other hand, performed worst in almost every test.…
CultureWhile the industry debates which neural network is the “smartest” and which framework is the “most modern,” decades-old technologies continue to quietly swirl beneath the surface of the banking industry . This year, COBOL turned…
CybercrimeOn Wednesday, December 31, Finnish authorities seized a cargo ship believed to be involved in the damage to an undersea telecommunications cable connecting Helsinki to Tallinn, Estonia. The action was triggered after a technical anomaly…
CybercrimeIn the landscape of cybercrime investigations, some cases take on particular significance not only because of the extent of the financial damage, but also because of the profile of the individuals involved . Ransomware investigations,…
CybercrimeBy 2025, cybercrime will increasingly go beyond “just money”: attacks aren’t just about downtime bills and ransom payments , but also about real human consequences, from healthcare disruptions and victim harassment to kidnappings, torture, and…











