Ultime news
Windows 11 Performance Test: Surprising Results with Windows 8.1
PentestAgent: Revolutionizing Penetration Testing with AI-Powered Tools
US Treasury Removes Sanctions on Intellexa Spyware Developers
Rue Language: Revolutionizing System Programming with AI
Password Security: The Impact of Human Behavior on Password Strength
Potential Data Breach at Pickett USA Exposes Critical Energy Infrastructure
Nezha Malware: Abusing Legitimate Tools for Remote Access
Redazione RHC - December 24th, 2025
Massive Cloud Cyberespionage: PCPcat Hits 59,128 Servers in 48 Hours
Redazione RHC - December 24th, 2025
Critical Net-SNMP Vulnerability Exposes Networks to RCE Attacks
Redazione RHC - December 24th, 2025
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - December 24th, 2025
Australia Boosts Papua New Guinea’s Digital Infra with New Undersea Cable
Redazione RHC - December 23rd, 2025
China Issues First Level 3 Autonomous Driving Licenses, Paving Way for Self-Driving Cars
Redazione RHC - December 23rd, 2025
Nvidia H200 Chip Shipments to China Set to Begin
Redazione RHC - December 23rd, 2025
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - December 23rd, 2025
Spotify Web Scraping: Anna’s Archive Scrapes 300TB of Music Library
Redazione RHC - December 23rd, 2025
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - December 23rd, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CultureMandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…
CybercrimeNo worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…
CybercrimeAfter a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…
CybercrimeCheck Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…











