Ultime news
EDRStartupHinder: Bypassing Windows EDR Security with BindLink
Burnout in Cybersecurity: The Hidden Risk to Your Organization
APT28 Phishing Campaign: Credential Harvesting Tactics
Iran Cyber Crisis: Connettività Compromised
ServiceNow AI Vulnerability CVE-2025-12420: Critical Security Risk
Microsoft Expands Global Network with New Undersea Fiber Optic Cables
Linus Torvalds on AI Coding: ‘It’s Just Another Tool’
Redazione RHC - January 11th, 2026
The Future of Tech: Sovereignty, Security, and Cloud Control
Redazione RHC - January 11th, 2026
Internet Shutdowns Cost $19.7B in 2025, Sophisticated Censorship Rises
Redazione RHC - January 11th, 2026
Doom on a Smart Pressure Cooker: The Ultimate IoT Hack
Redazione RHC - January 10th, 2026
LockBit 5.0 Ransomware: The Evolving Threat
Redazione RHC - January 10th, 2026
Instagram Data Leak Exposes 17.5 Million Users on Dark Web
Redazione RHC - January 10th, 2026
Phishing Emails Mimic Internal Comms via Microsoft 365 Spoofing
Redazione RHC - January 10th, 2026
Lovense Emily AI Doll: Revolutionary Companion at CES 2026
Redazione RHC - January 9th, 2026
HPE OneView Critical Vulnerability Exploited: Update Now to Prevent Attacks
Redazione RHC - January 9th, 2026
Undertow Vulnerability CVE-2025-12543 Exposes Java Ecosystem to Critical Security Risks
Redazione RHC - January 9th, 2026
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeCheck Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…
CybercrimeA recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…
CybercrimeOn January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…
CybercrimeDo you remember the 24-year-old hacker Carmelo Miano and the breaches of the Naples Prosecutor’s Office’s accounts and computer systems? It appears something similar happened in the United States, and the other young man is…
CybercrimeCloudflare CEO Matthew Prince has threatened to shut down the company’s operations in Italy after the country’s telecom regulator fined it twice its annual revenue in the country. The facts The conflict erupted around Italy’s…











