Ultime news
Uncovering Dark AI: The Truth Behind Crime-as-a-Service Chatbots
AI-Generated Mac Malware: SimpleStealth Threatens User Security
Linus Torvalds on AI Coding: ‘It’s Just Another Tool’
The Future of Tech: Sovereignty, Security, and Cloud Control
Internet Shutdowns Cost $19.7B in 2025, Sophisticated Censorship Rises
Doom on a Smart Pressure Cooker: The Ultimate IoT Hack
Potential Data Breach at Pickett USA Exposes Critical Energy Infrastructure
Redazione RHC - January 4th, 2026
Forensic Timeliner: Advanced Digital Forensics Tool for DFIR Analysis
Redazione RHC - January 4th, 2026
Google Unveils Nano Banana 2 Flash for Rapid Image Generation
Redazione RHC - January 4th, 2026
Ancient Chinese Silk Loom: The World’s First Computer?
Redazione RHC - January 3rd, 2026
Neuralink’s Brain-Computer Implants to Revolutionize Human Life by 2026
Redazione RHC - January 3rd, 2026
Zero-Day Exploits on the Rise: How to Protect Your Network
Redazione RHC - January 2nd, 2026
Long-Lived Technologies: COBOL, C, SQL, and Legacy Systems
Redazione RHC - January 2nd, 2026
PollyPolymer Revolutionizes Robotics with 3D Printed Flexible Components
Redazione RHC - January 2nd, 2026
GlassWorm Malware Targets macOS via Open VSX Extensions
Redazione RHC - January 2nd, 2026
AI Job Losses: Geoffrey Hinton Warns of Widespread Unemployment by 2026
Redazione RHC - January 2nd, 2026
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeA study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The study’s results were published by…
CybercrimeA new malware campaign has emerged in the macOS world, one that relies not on sophisticated exploits, but on good old-fashioned social engineering. It’s powered by the MacSync malware, distributed using the ” malware-as-a-service ”…
CybercrimeA sophisticated proxyjacking campaign is targeting systems in South Korea, attributed to the actor Larva-25012 , which distributes proxyware disguised as legitimate Notepad++ installers. The campaign demonstrates significant technical evolution, using process injection in explorer.exe…
CybercrimeFor over a year, the North Korean group PurpleBravo has been running a targeted malware campaign called “Contagious Interview,” using fake job interviews to attack companies in Europe, Asia, the Middle East, and Central America.…
CybercrimeCheck Point Research recently discovered a sophisticated phishing campaign orchestrated by KONNI , a threat group linked to North Korea . Historically focused on diplomatic targets in South Korea, the malicious actor has now expanded…











