Ultime news
QR Code Phishing via HTML: New Attack Vector Emerges
Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now
GoBruteforcer Botnet Exploits AI-Generated Server Configs, Targets Crypto
When Attack Discovery Becomes Automated, Detection Stops Scaling
VMware ESXi VM Escape Exploit: Advanced Threats Revealed
Supply Chain Security: Protect Your Business from Cyber Threats
Critical WebKit Vulnerability Exposes iOS Devices to Code Execution
Redazione RHC - December 29th, 2025
Xspeeder Devices Hit by AI-Discovered Zero-Day Vulnerability CVE-2025-54322
Redazione RHC - December 29th, 2025
TurboDiffusion: AI Video Generation Accelerated Up to 200 Times
Redazione RHC - December 29th, 2025
OpenAI to Introduce ChatGPT Ads, Revolutionizing AI-Powered Marketing
Redazione RHC - December 29th, 2025
Job Scams on Social Media: How to Avoid Fake Remote Job Offers
Redazione RHC - December 29th, 2025
MongoDB Vulnerability CVE-2025-14847: Critical Memory Disclosure Bug
Redazione RHC - December 28th, 2025
UK Boosts Subsea Cable Protection with Autonomous Vessels
Redazione RHC - December 28th, 2025
China’s Humanoid Robot Industry Booms with UBtech’s Walker S2
Redazione RHC - December 28th, 2025
Cyber Criminals Recruit Insiders: Companies at Risk of Internal Threats
Redazione RHC - December 27th, 2025
US Data Center Battery Dependency: A Growing Concern for AI and Defense
Redazione RHC - December 27th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
innovationThe question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry has repeatedly attempted to provide a concrete answer, without ever reaching a definitive solution. From…
CybercrimeThe BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by Picus Security details the group’s…
CybercrimeA study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The study’s results were published by…
CybercrimeA new malware campaign has emerged in the macOS world, one that relies not on sophisticated exploits, but on good old-fashioned social engineering. It’s powered by the MacSync malware, distributed using the ” malware-as-a-service ”…
CybercrimeA sophisticated proxyjacking campaign is targeting systems in South Korea, attributed to the actor Larva-25012 , which distributes proxyware disguised as legitimate Notepad++ installers. The campaign demonstrates significant technical evolution, using process injection in explorer.exe…











