Ultime news
Cyber Criminals Recruit Insiders: Companies at Risk of Internal Threats
US Data Center Battery Dependency: A Growing Concern for AI and Defense
Uzbekistan License Plate Surveillance System Exposed Online
Interpol Operation Sentinel Cracks Down on Cybercrime with 574 Arrests
Villager Framework: AI-Powered Penetration Testing Tool
TIME’s Machine of the Year: How Personal Computer Changed Society
DriverFixer0428: macOS Credential Stealer Linked to North Korea
Redazione RHC - December 25th, 2025
A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad
Redazione RHC - December 25th, 2025
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - December 24th, 2025
Nezha Malware: Abusing Legitimate Tools for Remote Access
Redazione RHC - December 24th, 2025
Massive Cloud Cyberespionage: PCPcat Hits 59,128 Servers in 48 Hours
Redazione RHC - December 24th, 2025
Critical Net-SNMP Vulnerability Exposes Networks to RCE Attacks
Redazione RHC - December 24th, 2025
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - December 24th, 2025
Australia Boosts Papua New Guinea’s Digital Infra with New Undersea Cable
Redazione RHC - December 23rd, 2025
China Issues First Level 3 Autonomous Driving Licenses, Paving Way for Self-Driving Cars
Redazione RHC - December 23rd, 2025
Nvidia H200 Chip Shipments to China Set to Begin
Redazione RHC - December 23rd, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeDuring the first half of December, a Chinese company assembling devices for Apple was hit by an advanced cyberattack that may have exposed sensitive information related to a production line. The incident was reported by…
CybercrimeThis article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable for its ability to generate…
CybercrimeA new report details a critical vulnerability discovered by security researcher Joseph Goydish in Apple’s WebKit engine. This security flaw, if exploited in conjunction with other exploits, could allow attackers to execute arbitrary code on…
CybercrimeWhen it comes to cybersecurity, it’s easy to fall into the trap of thinking that problems are always far away, that they only affect others. But the reality is that a vulnerability is always around…
CybercrimeFraudulent job ads promising easy money and remote work continue to flood social media, particularly in the Middle East and North Africa . Under the guise of part-time jobs that require no experience , scammers…











