Ultime news
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025
MS13-089 Ransomware: Double Extortion Without Encryption
San Francisco Power Outage Exposes Waymo Self-Driving Car Vulnerabilities
Microsoft Shifts Activation Process: What It Means for Air-Gapped Systems
PuTTY Under Siege: Hackers Exploit Popular Client for SSH Attacks
OAuth Device Code Phishing: New Attack Vector for Account Takeover
SonicWall SMA1000 Vulnerability: Critical Security Patch Released
Redazione RHC - December 18th, 2025
HPE OneView Vulnerability CVE-2025-37164: Critical Security Update Required
Redazione RHC - December 18th, 2025
CISA Warns of Critical Vulnerabilities in Cisco, SonicWall, and ASUS Devices
Redazione RHC - December 18th, 2025
Critical Windows Admin Center Flaw CVE-2025-64669 Exposes Servers to Attack
Redazione RHC - December 18th, 2025
Ink Dragon Hackers Uncovered: Sophisticated Cyber Espionage Operation
Redazione RHC - December 18th, 2025
Google Discontinues Dark Web Report, Shifts to Active Protection
Luca Galuppi - December 17th, 2025
CyberVolk Ransomware Flawed: Free File Recovery Possible
Redazione RHC - December 17th, 2025
OSINT Ethics and Legality: Navigating Open Source Intelligence
Alexandro Irace - December 17th, 2025
The Psychology of Passwords: Why Weak Passwords Persist
Simone D'Agostino - December 17th, 2025
Russian Cyber Operations Shift to Targeting Western Critical Infrastructure
Redazione RHC - December 17th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeThis article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable for its ability to generate…
CybercrimeA new report details a critical vulnerability discovered by security researcher Joseph Goydish in Apple’s WebKit engine. This security flaw, if exploited in conjunction with other exploits, could allow attackers to execute arbitrary code on…
CybercrimeWhen it comes to cybersecurity, it’s easy to fall into the trap of thinking that problems are always far away, that they only affect others. But the reality is that a vulnerability is always around…
CybercrimeFraudulent job ads promising easy money and remote work continue to flood social media, particularly in the Middle East and North Africa . Under the guise of part-time jobs that require no experience , scammers…
CybercrimeThe cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…











