Ultime news
Fortinet FortiSIEM Vulnerability CVE-2025-64155: Critical Security Update
ARM: The Future of Low-Power Computing and AI
24-Year-Old Hacker Breaches US Supreme Court Database
Cyberattack Hits Belgian Hospital AZ Monica, Ransomware Used
Meta Shifts Focus from Metaverse to AI-Powered Wearables
Anthropic’s Claude AI Takes Control with Computer Use Feature
EDRStartupHinder: Bypassing Windows EDR Security with BindLink
Redazione RHC - January 13th, 2026
Burnout in Cybersecurity: The Hidden Risk to Your Organization
Paloma Donadi - January 13th, 2026
APT28 Phishing Campaign: Credential Harvesting Tactics
Lorenzo Nardi - January 13th, 2026
Iran Cyber Crisis: Connettività Compromised
Roberto Villani - January 13th, 2026
ServiceNow AI Vulnerability CVE-2025-12420: Critical Security Risk
Redazione RHC - January 13th, 2026
Microsoft Expands Global Network with New Undersea Fiber Optic Cables
Redazione RHC - January 13th, 2026
Poisoning AI Data: The New Threat to Machine Learning Models
Redazione RHC - January 12th, 2026
Pig Butchering Scams Evolve with PBaaS: The New Threat
Redazione RHC - January 12th, 2026
Apache Struts 2 Vulnerability CVE-2025-68493 Exposes Sensitive Data
Redazione RHC - January 12th, 2026
CRISPR-Cas13: Breakthrough in Flu Treatment with Gene Editing
Redazione RHC - January 12th, 2026
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeElon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…
CultureMandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…
CybercrimeNo worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…
CybercrimeAfter a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…










