Ultime news
Alibaba Qwen3Max Dominates AI Market with Rapid Growth
Digital Surveillance at Work: The Rise of Algorithmic Monitoring
Windows Server Vulnerability Exploited: ShadowPad Malware Deployed
Salesforce Data Breach: ShinyHunters Hack Gainsight Integration
BadAudio Discovered: Ghost Malware Used by APT24 for Three Years Undetected
Satoshi Nakamoto’s Net Worth Drops 34% as Cryptocurrency Crash
Drones at Brussels Airport and Military Bases: Security at Risk
Redazione RHC - November 4th, 2025
Does Microsoft use macOS to create Windows wallpapers? Probably!
Redazione RHC - November 4th, 2025
Louvre Theft: Windows 2000 and Windows XP on Networks, as Well as Simple Passwords
Redazione RHC - November 4th, 2025
SesameOp: The Malware That Uses OpenAI Assistants for Command and Control
Redazione RHC - November 4th, 2025
Chinese hackers target European diplomatic agencies (including Italy)
Redazione RHC - November 4th, 2025
Eight 0-days worth $35 million sold to Russia by US insiders
Redazione RHC - November 4th, 2025
Trump refuses to export Nvidia chips. China responds: “Don’t worry, we’ll do it ourselves.”
Redazione RHC - November 4th, 2025
Goodbye, malware! In 2025, criminal hackers will use legitimate accounts to remain invisible.
Redazione RHC - November 4th, 2025
Cyberstalking Against Women: Analysis and Legal Implications
Paolo Galdieri - November 4th, 2025
WSUS security update has broken hotpatches on Windows Server 2025
Redazione RHC - November 3rd, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeA flaw has been discovered in the foundation of the Java web ecosystem. Undertow , the high-performance web server that powers enterprise heavyweights like WildFly and JBoss EAP , has been hit by a critical…
CybercrimeIranian protesters chanted and marched through the streets until Friday morning, following a call from exiled former Prince Reza Pahlavi to demonstrate, despite the Iranian theocracy cutting off the country from the internet and international…
CybercrimeBackups are generally considered the last line of defense, but this week Veeam reminded us that backup systems themselves can become entry points for attacks. The company released security updates for Backup & Replication ,…
CybercrimeFor much of the past two decades, cybersecurity has been built on a simple assumption: malicious activity can be detected, analysed, and responded to before meaningful damage occurs. This assumption shaped everything from SOC design…
CybercrimeThe vulnerability, identified as CVE-2026-21858, which we recently reported on, affects approximately 100,000 servers worldwide, threatening to expose proprietary API keys, customer databases, and AI workflows. The vulnerability, with a CVSS score of 10, has…











