Ultime news
Anthropic’s Claude AI Takes Control with Computer Use Feature
China Leads the Way with Level 3 Autonomous Vehicle License Plates
Orion Leaks: LockBit’s Shadow in Ransomware Ecosystem
Cloudflare vs Italy: The Battle for Internet Freedom and DNS Control
Understanding Data Breach: Protecting Sensitive Information
1X NEO Robot Unveils World Model for Advanced Learning
CRISPR-Cas13: Breakthrough in Flu Treatment with Gene Editing
Redazione RHC - January 12th, 2026
Uncovering Dark AI: The Truth Behind Crime-as-a-Service Chatbots
Redazione RHC - January 12th, 2026
AI-Generated Mac Malware: SimpleStealth Threatens User Security
Redazione RHC - January 11th, 2026
Linus Torvalds on AI Coding: ‘It’s Just Another Tool’
Redazione RHC - January 11th, 2026
The Future of Tech: Sovereignty, Security, and Cloud Control
Redazione RHC - January 11th, 2026
Internet Shutdowns Cost $19.7B in 2025, Sophisticated Censorship Rises
Redazione RHC - January 11th, 2026
Doom on a Smart Pressure Cooker: The Ultimate IoT Hack
Redazione RHC - January 10th, 2026
LockBit 5.0 Ransomware: The Evolving Threat
Redazione RHC - January 10th, 2026
Instagram Data Leak Exposes 17.5 Million Users on Dark Web
Redazione RHC - January 10th, 2026
Phishing Emails Mimic Internal Comms via Microsoft 365 Spoofing
Redazione RHC - January 10th, 2026
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeResearchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…
CybercrimeElon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…
CultureMandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…
CybercrimeNo worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…











