Ultime news
The Revolutionary iPhone Launch: A Game-Changing Moment in Tech History
Cloudflare Hit with €14M Fine for Failing to Block Pirate Content
Iran Protests Escalate as Reza Pahlavi Calls for Action Against Government
Taiwan Citizens Accused in China of Smuggling and Cable Sabotage
QR Code Phishing via HTML: New Attack Vector Emerges
Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now
Petlibro Vulnerabilities Exposed: Control Your Pet’s Safety Now
Redazione RHC - December 30th, 2025
MongoBleed Vulnerability Exploited: Update MongoDB Now to Prevent Data Breach
Redazione RHC - December 30th, 2025
Apple Supply Chain Hit by Cyberattack: Sensitive Data at Risk
Redazione RHC - December 30th, 2025
Browser-in-the-Browser Phishing Attack: How to Protect Yourself
Manuel Roccon - December 29th, 2025
Critical WebKit Vulnerability Exposes iOS Devices to Code Execution
Redazione RHC - December 29th, 2025
Xspeeder Devices Hit by AI-Discovered Zero-Day Vulnerability CVE-2025-54322
Redazione RHC - December 29th, 2025
TurboDiffusion: AI Video Generation Accelerated Up to 200 Times
Redazione RHC - December 29th, 2025
OpenAI to Introduce ChatGPT Ads, Revolutionizing AI-Powered Marketing
Redazione RHC - December 29th, 2025
Job Scams on Social Media: How to Avoid Fake Remote Job Offers
Redazione RHC - December 29th, 2025
MongoDB Vulnerability CVE-2025-14847: Critical Memory Disclosure Bug
Redazione RHC - December 28th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CyberpoliticsItaly has confirmed itself as one of the main targets of the DDoS attack campaign carried out by the hacktivist group NoName057(16) . According to what was declared directly by the collective, our country has…
innovationThe question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry has repeatedly attempted to provide a concrete answer, without ever reaching a definitive solution. From…
CybercrimeThe BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by Picus Security details the group’s…
CybercrimeA study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The study’s results were published by…
CybercrimeA new malware campaign has emerged in the macOS world, one that relies not on sophisticated exploits, but on good old-fashioned social engineering. It’s powered by the MacSync malware, distributed using the ” malware-as-a-service ”…











