Redazione RHC - January 9th, 2026
The Cybersecurity and Infrastructure Security Agency (CISA) of the United States of America has raised the alarm about the active exploitation of a critical vulnerability in HPE OneView , an...
Redazione RHC - January 9th, 2026
A flaw has been discovered in the foundation of the Java web ecosystem. Undertow , the high-performance web server that powers enterprise heavyweights like WildFly and JBoss EAP , has...
Redazione RHC - January 8th, 2026
Backups are generally considered the last line of defense, but this week Veeam reminded us that backup systems themselves can become entry points for attacks. The company released security updates...
Redazione RHC - January 8th, 2026
A new report published by the Huntress Tactical Response Team documents a highly sophisticated intrusion detected in December 2025 , in which an advanced actor managed to compromise a VMware...
Redazione RHC - January 7th, 2026
A critical remote code execution (RCE) flaw in older D-Link DSL routers has been identified as CVE-2026-0625, with a CVSS v4.0 score of 9.3, indicating a high risk for users...
Redazione RHC - January 7th, 2026
n8n, the “fair-code” workflow automation platform beloved by engineering teams for its combination of low-code speed and programming flexibility, has issued a critical security advisory. Few details are available on...
Redazione RHC - January 6th, 2026
WhatsApp, Meta's messaging app with over 3 billion monthly active users, has begun introducing technical changes to mitigate several privacy vulnerabilities on user devices . The fixes, identified through independent...
Redazione RHC - January 5th, 2026
A serious vulnerability has been discovered in the popular GNU command-line downloader Wget2 , which allows attackers to overwrite files on the victim's computer without their knowledge or consent. The...
Redazione RHC - December 31st, 2025
Apache StreamPipes is an open-source platform for real-time data analysis and processing (streaming analytics) , designed especially for IoT, Industry 4.0 and monitoring systems . Simply put: it is used...
Redazione RHC - December 30th, 2025
A series of vulnerabilities have been discovered in the popular Petlibro pet food vending ecosystem. In the worst-case scenario, these vulnerabilities allowed an attacker to log into someone else's account,...