Ultime news
1X NEO Robot Unveils World Model for Advanced Learning
Cybercrime Meets Real-Life Violence: Foxtrot Network’s Dark Side
EDRStartupHinder: Bypassing Windows EDR Security with BindLink
Burnout in Cybersecurity: The Hidden Risk to Your Organization
APT28 Phishing Campaign: Credential Harvesting Tactics
Iran Cyber Crisis: Connettività Compromised
Disable Windows 11 AI Features Easily with RemoveWindowsAI Tool
Redazione RHC - January 7th, 2026
DevSecOps: Integrating Security into Your Development Process
Massimiliano Brolli - January 7th, 2026
Critical RCE Vulnerability in D-Link DSL Routers – Update Now
Redazione RHC - January 7th, 2026
Critical n8n Vulnerability: Update Now to Prevent RCE Attacks
Redazione RHC - January 7th, 2026
Ledger Data Breach: Global-e Hack Exposes Customer Info
Redazione RHC - January 7th, 2026
LED Data Transmission System for Smart Traffic
Redazione RHC - January 7th, 2026
Microsoft Shifts to Rust: AI-Driven Code Transformation by 2030
Redazione RHC - January 7th, 2026
Microsoft’s AI Future: Models to Systems with Satya Nadella
Redazione RHC - January 6th, 2026
Rare Earth Elements: US-China Competition Heats Up
Redazione RHC - January 6th, 2026
Patchwork Group Unleashes StreamSpy Malware with WebSocket C2 Channel
Redazione RHC - January 6th, 2026
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeA study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The study’s results were published by…
CybercrimeA new malware campaign has emerged in the macOS world, one that relies not on sophisticated exploits, but on good old-fashioned social engineering. It’s powered by the MacSync malware, distributed using the ” malware-as-a-service ”…
CybercrimeA sophisticated proxyjacking campaign is targeting systems in South Korea, attributed to the actor Larva-25012 , which distributes proxyware disguised as legitimate Notepad++ installers. The campaign demonstrates significant technical evolution, using process injection in explorer.exe…
CybercrimeFor over a year, the North Korean group PurpleBravo has been running a targeted malware campaign called “Contagious Interview,” using fake job interviews to attack companies in Europe, Asia, the Middle East, and Central America.…
CybercrimeCheck Point Research recently discovered a sophisticated phishing campaign orchestrated by KONNI , a threat group linked to North Korea . Historically focused on diplomatic targets in South Korea, the malicious actor has now expanded…











