Ultime news
Apache ActiveMQ NMS AMQP Vulnerability in 9.8: Urgent Update Required
Microsoft blocks Vanilla Tempest: Fake Teams installers spread Rhysida ransomware
Nvidia loses 95% of the Chinese AI market! Export restrictions cause its share to plummet
Cyberdrones, radar evasion, and autonomous swarms: Rome, the invisible challenge of Jubilee 2025
It all started with LinkedIn and a work contact: developers lured, crypto wallets emptied
Nvidia, Microsoft, and xAI join forces to acquire Aligned Data Centers for $40 billion
Jupiter, the exascale supercomputer that aims to revolutionize AI in Europe
Redazione RHC - September 6th, 2025
38 million Italian phone numbers for sale on the dark web. It’s smishing!
Redazione RHC - September 6th, 2025
Apitor, the first robot that helps children do their homework and the whistleblower for China
Redazione RHC - September 6th, 2025
Hackable restaurant robots could serve sushi… at the attacker’s home.
Redazione RHC - September 6th, 2025
LECS powered by Cyber Evolution: la prima black box NDR completamente Made in Italy
Redazione RHC - September 6th, 2025
AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77
Redazione RHC - September 6th, 2025
Figure 02, the robot that loads the dishwasher with precision
Redazione RHC - September 5th, 2025
If Flash is dead, here’s the SVG Assassin! Phishing 2.0 is in high definition.
Redazione RHC - September 5th, 2025
The Dark Side of Windows Drivers: How to Steal Data While Ignoring EDR
Redazione RHC - September 5th, 2025
Zero-day vulnerability affecting TP-Link routers: what to know until the patch is released
Redazione RHC - September 5th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerability in the Linux kernel has caused…

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worrying security flaw in its…











