Ultime news
Cloudflare vs Italy: The Battle for Internet Freedom and DNS Control
Understanding Data Breach: Protecting Sensitive Information
1X NEO Robot Unveils World Model for Advanced Learning
Cybercrime Meets Real-Life Violence: Foxtrot Network’s Dark Side
EDRStartupHinder: Bypassing Windows EDR Security with BindLink
Burnout in Cybersecurity: The Hidden Risk to Your Organization
CVE-2026-21858: n8n Vulnerability Exposes Thousands of Servers to RCE
Redazione RHC - January 8th, 2026
Malware PHALT#BLYX Uses Social Engineering and MSBuild to Infect Systems
Redazione RHC - January 7th, 2026
Disable Windows 11 AI Features Easily with RemoveWindowsAI Tool
Redazione RHC - January 7th, 2026
DevSecOps: Integrating Security into Your Development Process
Massimiliano Brolli - January 7th, 2026
Critical RCE Vulnerability in D-Link DSL Routers – Update Now
Redazione RHC - January 7th, 2026
Critical n8n Vulnerability: Update Now to Prevent RCE Attacks
Redazione RHC - January 7th, 2026
Ledger Data Breach: Global-e Hack Exposes Customer Info
Redazione RHC - January 7th, 2026
LED Data Transmission System for Smart Traffic
Redazione RHC - January 7th, 2026
Microsoft Shifts to Rust: AI-Driven Code Transformation by 2030
Redazione RHC - January 7th, 2026
Microsoft’s AI Future: Models to Systems with Satya Nadella
Redazione RHC - January 6th, 2026
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
innovationThe question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry has repeatedly attempted to provide a concrete answer, without ever reaching a definitive solution. From…
CybercrimeThe BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by Picus Security details the group’s…
CybercrimeA study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The study’s results were published by…
CybercrimeA new malware campaign has emerged in the macOS world, one that relies not on sophisticated exploits, but on good old-fashioned social engineering. It’s powered by the MacSync malware, distributed using the ” malware-as-a-service ”…
CybercrimeA sophisticated proxyjacking campaign is targeting systems in South Korea, attributed to the actor Larva-25012 , which distributes proxyware disguised as legitimate Notepad++ installers. The campaign demonstrates significant technical evolution, using process injection in explorer.exe…











