Ultime news
Supply Chain Security: Protect Your Business from Cyber Threats
CVE-2026-21858: n8n Vulnerability Exposes Thousands of Servers to RCE
Malware PHALT#BLYX Uses Social Engineering and MSBuild to Infect Systems
Disable Windows 11 AI Features Easily with RemoveWindowsAI Tool
DevSecOps: Integrating Security into Your Development Process
Critical RCE Vulnerability in D-Link DSL Routers – Update Now
Windows X-Lite 11: Optimize Your Old PC with This Lightweight Version
Redazione RHC - December 31st, 2025
Crypto Malware Hacker Extradited to Korea for $1.18M Theft
Redazione RHC - December 31st, 2025
The Dark Side of Convenience: How Digital Payments Threaten Our Privacy
Sandro Sana - December 31st, 2025
Ransomware Attacks on the Rise: US Professionals Turn to Cybercrime
Redazione RHC - December 31st, 2025
Apache StreamPipes Vulnerability: Update to Prevent Admin Takeover
Redazione RHC - December 31st, 2025
The Dark Side of Cybercrime: Human Costs and Consequences
Redazione RHC - December 31st, 2025
OpenAI Hiring Chief Security Officer to Mitigate AI Risks
Redazione RHC - December 30th, 2025
Petlibro Vulnerabilities Exposed: Control Your Pet’s Safety Now
Redazione RHC - December 30th, 2025
MongoBleed Vulnerability Exploited: Update MongoDB Now to Prevent Data Breach
Redazione RHC - December 30th, 2025
Apple Supply Chain Hit by Cyberattack: Sensitive Data at Risk
Redazione RHC - December 30th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CultureMandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…
CybercrimeNo worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…
CybercrimeAfter a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…
CybercrimeCheck Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…











