Ultime news
Microsoft Shifts to Rust: AI-Driven Code Transformation by 2030
Microsoft’s AI Future: Models to Systems with Satya Nadella
Rare Earth Elements: US-China Competition Heats Up
Patchwork Group Unleashes StreamSpy Malware with WebSocket C2 Channel
WhatsApp Device Fingerprinting: New Measures Against Privacy Threats
Microsoft Removes Phone Activation for Windows and Office
TurboDiffusion: AI Video Generation Accelerated Up to 200 Times
Redazione RHC - December 29th, 2025
OpenAI to Introduce ChatGPT Ads, Revolutionizing AI-Powered Marketing
Redazione RHC - December 29th, 2025
Job Scams on Social Media: How to Avoid Fake Remote Job Offers
Redazione RHC - December 29th, 2025
MongoDB Vulnerability CVE-2025-14847: Critical Memory Disclosure Bug
Redazione RHC - December 28th, 2025
UK Boosts Subsea Cable Protection with Autonomous Vessels
Redazione RHC - December 28th, 2025
China’s Humanoid Robot Industry Booms with UBtech’s Walker S2
Redazione RHC - December 28th, 2025
Cyber Criminals Recruit Insiders: Companies at Risk of Internal Threats
Redazione RHC - December 27th, 2025
US Data Center Battery Dependency: A Growing Concern for AI and Defense
Redazione RHC - December 27th, 2025
Uzbekistan License Plate Surveillance System Exposed Online
Redazione RHC - December 27th, 2025
Interpol Operation Sentinel Cracks Down on Cybercrime with 574 Arrests
Redazione RHC - December 27th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…
CybercrimeAfter a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…
CybercrimeCheck Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…
CybercrimeA recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…
CybercrimeOn January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…











