Ultime news
PurpleBravo’s Contagious Interview: Malware Campaign Targets Global Firms
KONNI Malware Targets Crypto Developers with AI-Powered Attacks
LastPass Phishing Attack: Protect Your Master Password Now
Zoom Security Alert: Critical Vulnerability in Node MMR Devices
LockBit 5.0 Ransomware: New Threats and Advanced Tactics
Fortinet FortiOS Vulnerability Exploited: CVE-2025-59718 Patch Bypass
Everest Ransomware Attacks McDonald’s, 861GB Data Stolen
Redazione RHC - January 21st, 2026
ESXi Zero-Day Exploit: How to Protect Your VMware Environment
Redazione RHC - January 20th, 2026
VoidLink Malware: AI-Generated Threat for Linux Systems
Redazione RHC - January 20th, 2026
Google Fast Pair Vulnerability: WhisperPair Exposes Millions of Devices
Redazione RHC - January 19th, 2026
Elon Musk Sues OpenAI for $134 Billion Over AI Betrayal
Redazione RHC - January 19th, 2026
Net-NTLMv1 Exploitation: Rainbow Tables for Modern Attacks
Redazione RHC - January 18th, 2026
Critical Vulnerability in Modular DS WordPress Plugin – Update Now
Redazione RHC - January 18th, 2026
Your paycheck is zero! Congratulations, someone answered the phone wrong
Redazione RHC - January 18th, 2026
Two Ukrainians Suspected in Black Basta Ransomware Attacks
Pietro Melillo - January 17th, 2026
From Zero-Day Exploits to Hidden Tunnels: How UAT-8837 Operates
Redazione RHC - January 17th, 2026
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
Cyber NewsItaly has confirmed itself as one of the main targets of the DDoS attack campaign carried out by the hacktivist group NoName057(16) . According to what was declared directly by the collective, our country has…
Cyber NewsThe question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry has repeatedly attempted to provide a concrete answer, without ever reaching a definitive solution. From…
Cyber NewsThe BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by Picus Security details the group’s…
Cyber NewsA study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The study’s results were published by…
Cyber NewsA new malware campaign has emerged in the macOS world, one that relies not on sophisticated exploits, but on good old-fashioned social engineering. It’s powered by the MacSync malware, distributed using the ” malware-as-a-service ”…












