Ultime news
How Profanity Varies Across Social Media and Cultures
GhostFrame Phishing Kit: New Stealthy PhaaS Threat Emerges
WhatsApp: all it takes is a phone number to know when you sleep, go out, or come home
Cyber Geopolitics: How Tech Becomes a Global Battleground
SOAP Vulnerability in .NET Framework Allows Remote Code Execution
CVE-2025-55182 React Server Components Vulnerability Exploited
Microsoft Outlook RCE Vulnerability: Update Now to Prevent Attacks
Redazione RHC - December 11th, 2025
Google Chrome Urgent Update Fixes Zero-Day Vulnerability
Redazione RHC - December 11th, 2025
EtherRAT Malware Exploits React2Shell Vulnerability with Ethereum C2
Redazione RHC - December 11th, 2025
Is QDay approaching? QuantWare presents its 10,000-qubit quantum processor
Redazione RHC - December 10th, 2025
Ivanti Endpoint Manager Vulnerabilities: Update Now to Prevent RCE
Redazione RHC - December 10th, 2025
Malicious VSCode Extensions Steal Crypto Wallets and Browser Sessions
Redazione RHC - December 10th, 2025
Windows Cloud Files Mini Filter Vulnerability Under Active Exploitation
Redazione RHC - December 10th, 2025
The Dark Side of AI: How Technology is Being Used to Control Humans
Sandro Sana - December 10th, 2025
Gartner Warns: AI-Powered Browsers Pose Significant Security Risks to Businesses
Redazione RHC - December 10th, 2025
Asus Hacked: Everest Ransomware Group Claims Data Breach
Redazione RHC - December 10th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerability in the Linux kernel has caused…

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worrying security flaw in its…











