Ultime news
When Attack Discovery Becomes Automated, Detection Stops Scaling
VMware ESXi VM Escape Exploit: Advanced Threats Revealed
Supply Chain Security: Protect Your Business from Cyber Threats
CVE-2026-21858: n8n Vulnerability Exposes Thousands of Servers to RCE
Malware PHALT#BLYX Uses Social Engineering and MSBuild to Infect Systems
Disable Windows 11 AI Features Easily with RemoveWindowsAI Tool
China Boosts AI Education with New Strategy to Prepare Students for Digital Age
Redazione RHC - December 31st, 2025
Finland Seizes Ship in Cable Damage Probe, Cites Security Threat
Redazione RHC - December 31st, 2025
Windows X-Lite 11: Optimize Your Old PC with This Lightweight Version
Redazione RHC - December 31st, 2025
Crypto Malware Hacker Extradited to Korea for $1.18M Theft
Redazione RHC - December 31st, 2025
The Dark Side of Convenience: How Digital Payments Threaten Our Privacy
Sandro Sana - December 31st, 2025
Ransomware Attacks on the Rise: US Professionals Turn to Cybercrime
Redazione RHC - December 31st, 2025
Apache StreamPipes Vulnerability: Update to Prevent Admin Takeover
Redazione RHC - December 31st, 2025
The Dark Side of Cybercrime: Human Costs and Consequences
Redazione RHC - December 31st, 2025
OpenAI Hiring Chief Security Officer to Mitigate AI Risks
Redazione RHC - December 30th, 2025
Petlibro Vulnerabilities Exposed: Control Your Pet’s Safety Now
Redazione RHC - December 30th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeResearchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…
CybercrimeElon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…
CultureMandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…
CybercrimeNo worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…











