
10 steps to make your company cyber-secure: the RHC guide.
In recent weeks, cyber activity on the internet – due to the Russia-Ukraine conflict – has increased significantly. In recent years, ransomware attacks have pushed
In recent weeks, cyber activity on the internet – due to the Russia-Ukraine conflict – has increased significantly. In recent years, ransomware attacks have pushed
Gaming peripheral manufacturer Endgame Gear reported that between June 26 and July 9, 2025, malware was inserted into the company’s official website, hidden in the
The Lovense platform, which has long carved out a niche market for itself with app-controlled sex toys (including models such as Lush, Gush, and Kraken),
Physicists at Aalto University (Finland) have set a new world record for the duration of the coherent state of a superconducting qubit, the core of
Microsoft said that attackers may have exploited a recently patched Transparency, Consent, and Control (TCC) bypass vulnerability to steal sensitive information from macOS users, including
A phishing attack that mimics an urgent Zoom meeting is being used by cybercriminals to steal corporate credentials, using a fake interface so realistic it’s
Networked smart devices are no longer simple helpers, but potential enemies. With every new thermostat or TV connected to the internet, a new flaw opens
While the West battles ransomware attacks and private companies invest in defensive security, on the other side of the digital front, the war is being
The FBI has issued a warning about a rapidly growing threat from IRL Com, a subgroup of the underground group The Com that actively recruits
In recent years, cybersecurity has seen the emergence of increasingly sophisticated threats, capable of compromising devices and personal data without the user taking any action.