Ultime news
BadAudio Discovered: Ghost Malware Used by APT24 for Three Years Undetected
Satoshi Nakamoto’s Net Worth Drops 34% as Cryptocurrency Crash
Cyberattack on Eurofiber France: Find out what happened
From Risk to Resilience: How Veeam Protects Your Supply Chain from Disruptions
When the Cloud Falls: How a Small Mistake Brought the Global Internet to Its Knees
Father and son break world speed record with homemade drone
Undersea Cables, the New Hybrid War: Jaroslav Nad’s Alarm
Redazione RHC - November 6th, 2025
Apache OpenOffice under ransomware attack, but the foundation disputes
Redazione RHC - November 6th, 2025
Microsoft Exchange Server Penetration Testing: Techniques, Tools, and Countermeasures
Alessandro Molinari - November 6th, 2025
Notepad++ under attack! How a fake DLL opens the door to criminal hackers
Manuel Roccon - November 6th, 2025
Microsoft warns: Security updates cause problems with BitLocker
Redazione RHC - November 5th, 2025
A dangerous zero-day zero-click exploit threatens billions of Android devices
Redazione RHC - November 5th, 2025
Is the era of paywalls over? Smart browsers circumvent them, and controlling them is very difficult
Redazione RHC - November 5th, 2025
Danger for OneDrive users: Infected DLLs hide in shared files
Redazione RHC - November 5th, 2025
ArXiv blocks articles generated by AI
Redazione RHC - November 5th, 2025
CISA Warns! New Bugs in Gladinet, Control Web Panel, and WordPress Expose Systems
Redazione RHC - November 5th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeA comparison test across six generations of Windows was conducted by YouTube channel TrigrZolt , which unexpectedly revealed a clear winner: Windows 8.1. Windows 11, on the other hand, performed worst in almost every test.…
CultureWhile the industry debates which neural network is the “smartest” and which framework is the “most modern,” decades-old technologies continue to quietly swirl beneath the surface of the banking industry . This year, COBOL turned…
CybercrimeOn Wednesday, December 31, Finnish authorities seized a cargo ship believed to be involved in the damage to an undersea telecommunications cable connecting Helsinki to Tallinn, Estonia. The action was triggered after a technical anomaly…
CybercrimeIn the landscape of cybercrime investigations, some cases take on particular significance not only because of the extent of the financial damage, but also because of the profile of the individuals involved . Ransomware investigations,…
CybercrimeBy 2025, cybercrime will increasingly go beyond “just money”: attacks aren’t just about downtime bills and ransom payments , but also about real human consequences, from healthcare disruptions and victim harassment to kidnappings, torture, and…











