Ultime news
Cyberattack on Eurofiber France: Find out what happened
From Risk to Resilience: How Veeam Protects Your Supply Chain from Disruptions
When the Cloud Falls: How a Small Mistake Brought the Global Internet to Its Knees
Father and son break world speed record with homemade drone
Microsoft Blocks KMS38 Activation Method for Windows 10 and 11
Future prospects for computer science and technology graduates
Hanyuan-1: China’s room-temperature quantum computer challenges the US
Redazione RHC - November 3rd, 2025
Inside NVIDIA: Jensen Huang leads 36 managers, 36,000 employees, and reads 20,000 emails a day
Redazione RHC - November 3rd, 2025
Userbox shut down and its admin arrested by Moscow police. Something is changing.
Redazione RHC - November 3rd, 2025
Will Bug Hunters Be Out of Work? OpenAI Introduces Aardvark, Its New Bug Fixer
Redazione RHC - November 3rd, 2025
The Louvre Theft: How Password Governance Can Undermine Security
Redazione RHC - November 3rd, 2025
Xi Jinping proposes a global organization for artificial intelligence
Redazione RHC - November 3rd, 2025
The Future of Society in the Age of Artificial Intelligence
Ugo Micci - November 3rd, 2025
When Google Indexes Even Deception! Ghost Networks Discovered by RHC That Penalize SERPs
Redazione RHC - November 3rd, 2025
Alleged EY Data Leak: 4TB of SQL Backups Exposed on Azure Cloud
Luca Stivali - November 3rd, 2025
Theft at the Louvre: The surveillance system’s password “LOUVRE” has put the museum in crisis.
Redazione RHC - November 2nd, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeA flaw has been discovered in the foundation of the Java web ecosystem. Undertow , the high-performance web server that powers enterprise heavyweights like WildFly and JBoss EAP , has been hit by a critical…
CybercrimeIranian protesters chanted and marched through the streets until Friday morning, following a call from exiled former Prince Reza Pahlavi to demonstrate, despite the Iranian theocracy cutting off the country from the internet and international…
CybercrimeBackups are generally considered the last line of defense, but this week Veeam reminded us that backup systems themselves can become entry points for attacks. The company released security updates for Backup & Replication ,…
CybercrimeFor much of the past two decades, cybersecurity has been built on a simple assumption: malicious activity can be detected, analysed, and responded to before meaningful damage occurs. This assumption shaped everything from SOC design…
CybercrimeThe vulnerability, identified as CVE-2026-21858, which we recently reported on, affects approximately 100,000 servers worldwide, threatening to expose proprietary API keys, customer databases, and AI workflows. The vulnerability, with a CVSS score of 10, has…











