Ultime news
Google Unveils Gemini 3 Flash AI Model, Rivals OpenAI GPT-5.2
Rise of AI Degrees: Students Shift from Computer Science to AI
SonicWall SMA1000 Vulnerability: Critical Security Patch Released
HPE OneView Vulnerability CVE-2025-37164: Critical Security Update Required
CISA Warns of Critical Vulnerabilities in Cisco, SonicWall, and ASUS Devices
Critical Windows Admin Center Flaw CVE-2025-64669 Exposes Servers to Attack
NANOREMOTE Trojan Uses Google Drive for Command and Control
Redazione RHC - December 12th, 2025
Microsoft Azure OAuth Attack: ConsentFix Malware Steals Accounts
Redazione RHC - December 12th, 2025
Linux Foundation Launches Agentic AI Foundation with Key Tech Players
Redazione RHC - December 12th, 2025
Disney Invests $1 Billion in OpenAI for Sora Video Deal
Redazione RHC - December 12th, 2025
Microsoft 365 Okta Phishing Attack: Experts Warn of New Threat
Redazione RHC - December 12th, 2025
React Server Components Vulnerability: Update to Prevent DoS Attacks
Redazione RHC - December 12th, 2025
Critical Windows PowerShell Vulnerability CVE-2025-54100: Update Now
Redazione RHC - December 12th, 2025
Telegram Losing Ground to Crackdown on Cybercrime Activities
Redazione RHC - December 12th, 2025
Notepad++ Vulnerability Fixed: Update to 8.8.9 to Avoid Malware
Redazione RHC - December 11th, 2025
NetSupport RAT Malware Campaign Uncovered: Expert Analysis
Redazione RHC - December 11th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeDuring the first half of December, a Chinese company assembling devices for Apple was hit by an advanced cyberattack that may have exposed sensitive information related to a production line. The incident was reported by…
CybercrimeThis article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable for its ability to generate…
CybercrimeA new report details a critical vulnerability discovered by security researcher Joseph Goydish in Apple’s WebKit engine. This security flaw, if exploited in conjunction with other exploits, could allow attackers to execute arbitrary code on…
CybercrimeWhen it comes to cybersecurity, it’s easy to fall into the trap of thinking that problems are always far away, that they only affect others. But the reality is that a vulnerability is always around…
CybercrimeFraudulent job ads promising easy money and remote work continue to flood social media, particularly in the Middle East and North Africa . Under the guise of part-time jobs that require no experience , scammers…











