Ultime news
SAP Security Update Fixes Critical Code Injection Vulnerability in Solution Manager
Passwordless Authentication: The Future of Secure Online Access
Critical PromptPwnd Vulnerability Exposes AI-Powered GitLab, GitHub Pipelines
LLM-Powered Malware: The Future of Autonomous Cyber Threats
Intellexa Exploits Zero-Day Vulnerabilities with Spyware
Malaysia Cracks Down on Bitcoin Mining Thefts
Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage
Redazione RHC - November 15th, 2025
North Korea reorganizes its intelligence with a new agency
Redazione RHC - November 15th, 2025
Cognitive Biases and Cybersecurity: The Fatal Fallacy of “I Have Nothing to Hide”
Fabrizio Saviano - November 15th, 2025
Did they give you a digital photo frame? It’s more than just family memories.
Sandro Sana - November 15th, 2025
What are PsyOps? Exploring mind manipulation in the digital age.
Stefano Gazzella - November 15th, 2025
Understanding Firewalls: The First Line of Defense in Cybersecurity
Stefano Gazzella - November 15th, 2025
Critical Vulnerability in FortiWeb: Fortinet and CISA Recommend Urgent Updates
Massimiliano Brolli - November 15th, 2025
China’s New Era of Robots: Shenzhen at the Center of the Technological Revolution
Silvia Felici - November 15th, 2025
IndonesianFoods: The Worm That’s Wreaking Havoc on npm and Created 100,000 Packages
Redazione RHC - November 15th, 2025
Vibe-Hacking: The New Frontier of Criminal Cybersecurity
Andrea Fellegara - November 15th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
Cyber NewsPixelCode began as a research project exploring a hidden technique for storing binary data within images or videos . Instead of leaving a plaintext executable, the file is converted into pixel data, transforming each byte…
Cyber NewsSecurity researchers have recently observed a worrying evolution in the offensive tactics attributed to North Korean-linked actors as part of the campaign known as Contagious Interview : no longer simple fake job interview scams, but…
Cyber NewsKhaby Lame, the world’s most followed Italian creator and now a global social media icon, has taken a step that could mark a turning point in the history of the digital economy. According to several…
Cyber NewsThe critical vulnerability recently added to the Cybersecurity and Infrastructure Security Agency (CISA) catalog of known exploited vulnerabilities (KEVs) affects the Broadcom VMware vCenter Server and is being actively exploited by malicious hackers to breach…
Cyber NewsThe story ofIlya Lichtenstein, the hacker responsible for one of the largest cyber attacks ever carried out against cryptocurrencies, reads like an episode of a TV series, yet it is absolutely real. After being released,…












