Ultime news
AWS CodeBuild Vulnerability Exposed: CodeBreach Threat Revealed
Microsoft Patches Zero-Day NTFS Vulnerabilities in Windows 11 and Server
AVCheck Malware Service Shut Down: Dutch Man Arrested for Cybercrime
VoidLink Malware: Advanced Linux Framework Targets Cloud Infrastructures
Microsoft Ends Support for Windows Server 2008: What It Means
The AI Energy Crisis: How Data Centers Are Reshaping US Power Costs
Linus Torvalds on AI Coding: ‘It’s Just Another Tool’
Redazione RHC - January 11th, 2026
The Future of Tech: Sovereignty, Security, and Cloud Control
Silvia Felici - January 11th, 2026
Internet Shutdowns Cost $19.7B in 2025, Sophisticated Censorship Rises
Redazione RHC - January 11th, 2026
Doom on a Smart Pressure Cooker: The Ultimate IoT Hack
Redazione RHC - January 10th, 2026
LockBit 5.0 Ransomware: The Evolving Threat
Pietro Melillo - January 10th, 2026
Instagram Data Leak Exposes 17.5 Million Users on Dark Web
Redazione RHC - January 10th, 2026
Phishing Emails Mimic Internal Comms via Microsoft 365 Spoofing
Redazione RHC - January 10th, 2026
Lovense Emily AI Doll: Revolutionary Companion at CES 2026
Redazione RHC - January 9th, 2026
HPE OneView Critical Vulnerability Exploited: Update Now to Prevent Attacks
Agostino Pellegrino - January 9th, 2026
Undertow Vulnerability CVE-2025-12543 Exposes Java Ecosystem to Critical Security Risks
Agostino Pellegrino - January 9th, 2026
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
Cyber NewsThe critical vulnerability recently added to the Cybersecurity and Infrastructure Security Agency (CISA) catalog of known exploited vulnerabilities (KEVs) affects the Broadcom VMware vCenter Server and is being actively exploited by malicious hackers to breach…
Cyber NewsThe story ofIlya Lichtenstein, the hacker responsible for one of the largest cyber attacks ever carried out against cryptocurrencies, reads like an episode of a TV series, yet it is absolutely real. After being released,…
Cyber NewsItaly has confirmed itself as one of the main targets of the DDoS attack campaign carried out by the hacktivist group NoName057(16) . According to what was declared directly by the collective, our country has…
Cyber NewsThe question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry has repeatedly attempted to provide a concrete answer, without ever reaching a definitive solution. From…
Cyber NewsThe BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by Picus Security details the group’s…












