Ultime news
GoBruteforcer Botnet Exploits AI-Generated Server Configs, Targets Crypto
When Attack Discovery Becomes Automated, Detection Stops Scaling
VMware ESXi VM Escape Exploit: Advanced Threats Revealed
Supply Chain Security: Protect Your Business from Cyber Threats
CVE-2026-21858: n8n Vulnerability Exposes Thousands of Servers to RCE
Malware PHALT#BLYX Uses Social Engineering and MSBuild to Infect Systems
NVIDIA Tegra X2 Vulnerability: Millions of Devices at Risk
Redazione RHC - January 1st, 2026
China Regulates AI Chatbots with Human-like Interaction
Redazione RHC - January 1st, 2026
The Dark Side of AI Rights: Why Experts Are Urging Caution
Redazione RHC - January 1st, 2026
EU’s Child Sexual Abuse Regulation: Balancing Safety and Digital Rights
Paolo Galdieri - January 1st, 2026
AI Systems Vulnerable to Attacks: Experts Warn of New Threats
Redazione RHC - January 1st, 2026
China Boosts AI Education with New Strategy to Prepare Students for Digital Age
Redazione RHC - December 31st, 2025
Finland Seizes Ship in Cable Damage Probe, Cites Security Threat
Redazione RHC - December 31st, 2025
Windows X-Lite 11: Optimize Your Old PC with This Lightweight Version
Redazione RHC - December 31st, 2025
Crypto Malware Hacker Extradited to Korea for $1.18M Theft
Redazione RHC - December 31st, 2025
The Dark Side of Convenience: How Digital Payments Threaten Our Privacy
Sandro Sana - December 31st, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…
CybercrimeAfter a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…
CybercrimeCheck Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…
CybercrimeA recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…
CybercrimeOn January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…











