Ultime news
24-Year-Old Hacker Breaches US Supreme Court Database
Cyberattack Hits Belgian Hospital AZ Monica, Ransomware Used
Meta Shifts Focus from Metaverse to AI-Powered Wearables
Anthropic’s Claude AI Takes Control with Computer Use Feature
China Leads the Way with Level 3 Autonomous Vehicle License Plates
Orion Leaks: LockBit’s Shadow in Ransomware Ecosystem
QR Code Phishing via HTML: New Attack Vector Emerges
Redazione RHC - January 8th, 2026
Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now
Agostino Pellegrino - January 8th, 2026
GoBruteforcer Botnet Exploits AI-Generated Server Configs, Targets Crypto
Sandro Sana - January 8th, 2026
When Attack Discovery Becomes Automated, Detection Stops Scaling
Alexander Rogan - January 8th, 2026
VMware ESXi VM Escape Exploit: Advanced Threats Revealed
Redazione RHC - January 8th, 2026
Supply Chain Security: Protect Your Business from Cyber Threats
Redazione RHC - January 8th, 2026
CVE-2026-21858: n8n Vulnerability Exposes Thousands of Servers to RCE
Agostino Pellegrino - January 8th, 2026
Malware PHALT#BLYX Uses Social Engineering and MSBuild to Infect Systems
Redazione RHC - January 7th, 2026
Disable Windows 11 AI Features Easily with RemoveWindowsAI Tool
Redazione RHC - January 7th, 2026
DevSecOps: Integrating Security into Your Development Process
Massimiliano Brolli - January 7th, 2026
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
Cyber NewsItaly has confirmed itself as one of the main targets of the DDoS attack campaign carried out by the hacktivist group NoName057(16) . According to what was declared directly by the collective, our country has…
Cyber NewsThe question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry has repeatedly attempted to provide a concrete answer, without ever reaching a definitive solution. From…
Cyber NewsThe BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by Picus Security details the group’s…
Cyber NewsA study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The study’s results were published by…
Cyber NewsA new malware campaign has emerged in the macOS world, one that relies not on sophisticated exploits, but on good old-fashioned social engineering. It’s powered by the MacSync malware, distributed using the ” malware-as-a-service ”…












