Ultime news
1X NEO Robot Unveils World Model for Advanced Learning
Cybercrime Meets Real-Life Violence: Foxtrot Network’s Dark Side
EDRStartupHinder: Bypassing Windows EDR Security with BindLink
Burnout in Cybersecurity: The Hidden Risk to Your Organization
APT28 Phishing Campaign: Credential Harvesting Tactics
Iran Cyber Crisis: Connettività Compromised
Internet Shutdowns Cost $19.7B in 2025, Sophisticated Censorship Rises
Redazione RHC - January 11th, 2026
Doom on a Smart Pressure Cooker: The Ultimate IoT Hack
Redazione RHC - January 10th, 2026
LockBit 5.0 Ransomware: The Evolving Threat
Redazione RHC - January 10th, 2026
Instagram Data Leak Exposes 17.5 Million Users on Dark Web
Redazione RHC - January 10th, 2026
Phishing Emails Mimic Internal Comms via Microsoft 365 Spoofing
Redazione RHC - January 10th, 2026
Lovense Emily AI Doll: Revolutionary Companion at CES 2026
Redazione RHC - January 9th, 2026
HPE OneView Critical Vulnerability Exploited: Update Now to Prevent Attacks
Redazione RHC - January 9th, 2026
Undertow Vulnerability CVE-2025-12543 Exposes Java Ecosystem to Critical Security Risks
Redazione RHC - January 9th, 2026
The Revolutionary iPhone Launch: A Game-Changing Moment in Tech History
Gaia Russo - January 9th, 2026
Cloudflare Hit with €14M Fine for Failing to Block Pirate Content
Redazione RHC - January 9th, 2026
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…
CybercrimeAfter a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…
CybercrimeCheck Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…
CybercrimeA recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…
CybercrimeOn January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…











