Ultime news
Xspeeder Devices Hit by AI-Discovered Zero-Day Vulnerability CVE-2025-54322
TurboDiffusion: AI Video Generation Accelerated Up to 200 Times
OpenAI to Introduce ChatGPT Ads, Revolutionizing AI-Powered Marketing
Job Scams on Social Media: How to Avoid Fake Remote Job Offers
MongoDB Vulnerability CVE-2025-14847: Critical Memory Disclosure Bug
UK Boosts Subsea Cable Protection with Autonomous Vessels
Nvidia H200 Chip Shipments to China Set to Begin
Redazione RHC - December 23rd, 2025
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - December 23rd, 2025
Spotify Web Scraping: Anna’s Archive Scrapes 300TB of Music Library
Redazione RHC - December 23rd, 2025
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - December 23rd, 2025
Ukrainian Hacker Charged in Major Ransomware Attacks
Redazione RHC - December 23rd, 2025
The Rise of Digital Walls: How National Sovereignty Threatens Global Internet
Redazione RHC - December 23rd, 2025
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - December 23rd, 2025
Smart TV Spying: Major Brands Accused of Collecting User Data
Redazione RHC - December 23rd, 2025
Phishing Campaigns Exploit File Sharing Services
Redazione RHC - December 23rd, 2025
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Redazione RHC - December 22nd, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeA comparison test across six generations of Windows was conducted by YouTube channel TrigrZolt , which unexpectedly revealed a clear winner: Windows 8.1. Windows 11, on the other hand, performed worst in almost every test.…
CultureWhile the industry debates which neural network is the “smartest” and which framework is the “most modern,” decades-old technologies continue to quietly swirl beneath the surface of the banking industry . This year, COBOL turned…
CybercrimeOn Wednesday, December 31, Finnish authorities seized a cargo ship believed to be involved in the damage to an undersea telecommunications cable connecting Helsinki to Tallinn, Estonia. The action was triggered after a technical anomaly…
CybercrimeIn the landscape of cybercrime investigations, some cases take on particular significance not only because of the extent of the financial damage, but also because of the profile of the individuals involved . Ransomware investigations,…
CybercrimeBy 2025, cybercrime will increasingly go beyond “just money”: attacks aren’t just about downtime bills and ransom payments , but also about real human consequences, from healthcare disruptions and victim harassment to kidnappings, torture, and…











