Ultime news
Amnesty International Launches .onion Site for Secure Access to Human Rights Info
NANOREMOTE Trojan Uses Google Drive for Command and Control
Microsoft Azure OAuth Attack: ConsentFix Malware Steals Accounts
Linux Foundation Launches Agentic AI Foundation with Key Tech Players
Disney Invests $1 Billion in OpenAI for Sora Video Deal
Microsoft 365 Okta Phishing Attack: Experts Warn of New Threat
Intellexa Exploits Zero-Day Vulnerabilities with Spyware
Redazione RHC - December 8th, 2025
Malaysia Cracks Down on Bitcoin Mining Thefts
Redazione RHC - December 8th, 2025
Australia Bans Social Media for Under 16s: What You Need to Know
Redazione RHC - December 8th, 2025
Palo Alto Networks VPN Vulnerability Exploited by Hackers
Redazione RHC - December 8th, 2025
US Brothers Accused of Destroying 96 Databases with AI
Redazione RHC - December 8th, 2025
US Seizes Phishing Site Used by Myanmar Scammers to Steal Millions
Redazione RHC - December 8th, 2025
Digital Literacy in Schools: The Key to Unlocking Students’ Potential
Inva Malaj - December 8th, 2025
OSINT Investigation: Uncovering Digital Evidence
Alexandro Irace - December 8th, 2025
Europe’s Digital Sovereignty: The Risks of Relying on Non-European Tech
Redazione RHC - December 7th, 2025
Apple’s Major Shake-Up: Johny Srouji Leaves as Senior VP of Hardware Technologies
Redazione RHC - December 7th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

The popular video app TikTok has found itself at the center of a new scandal over violations of European data protection regulations. The service has been found to track users’ activity not only within its…

Former Israeli Prime Minister Naftali Bennett has admitted that his Telegram account was hacked, although his device was not compromised. He made the announcement following reports of a hacked iPhone and a data leak allegedly…

A critical zero-day flaw in Cisco Secure Email Gateway and Cisco Secure Email and Web Manager devices is causing concern among security researchers. With over 120 vulnerable devices already identified and actively exploited by attackers,…

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…











