Ultime news
LockBit 5.0 Ransomware: The Evolving Threat
Instagram Data Leak Exposes 17.5 Million Users on Dark Web
Phishing Emails Mimic Internal Comms via Microsoft 365 Spoofing
Lovense Emily AI Doll: Revolutionary Companion at CES 2026
HPE OneView Critical Vulnerability Exploited: Update Now to Prevent Attacks
Undertow Vulnerability CVE-2025-12543 Exposes Java Ecosystem to Critical Security Risks
Crypto Malware Hacker Extradited to Korea for $1.18M Theft
Redazione RHC - December 31st, 2025
The Dark Side of Convenience: How Digital Payments Threaten Our Privacy
Sandro Sana - December 31st, 2025
Ransomware Attacks on the Rise: US Professionals Turn to Cybercrime
Redazione RHC - December 31st, 2025
Apache StreamPipes Vulnerability: Update to Prevent Admin Takeover
Massimiliano Brolli - December 31st, 2025
The Dark Side of Cybercrime: Human Costs and Consequences
Stefano Gazzella - December 31st, 2025
OpenAI Hiring Chief Security Officer to Mitigate AI Risks
Redazione RHC - December 30th, 2025
Petlibro Vulnerabilities Exposed: Control Your Pet’s Safety Now
Agostino Pellegrino - December 30th, 2025
MongoBleed Vulnerability Exploited: Update MongoDB Now to Prevent Data Breach
Massimiliano Brolli - December 30th, 2025
Apple Supply Chain Hit by Cyberattack: Sensitive Data at Risk
Redazione RHC - December 30th, 2025
Browser-in-the-Browser Phishing Attack: How to Protect Yourself
Manuel Roccon - December 29th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
Cyber NewsThe critical vulnerability recently added to the Cybersecurity and Infrastructure Security Agency (CISA) catalog of known exploited vulnerabilities (KEVs) affects the Broadcom VMware vCenter Server and is being actively exploited by malicious hackers to breach…
Cyber NewsThe story ofIlya Lichtenstein, the hacker responsible for one of the largest cyber attacks ever carried out against cryptocurrencies, reads like an episode of a TV series, yet it is absolutely real. After being released,…
Cyber NewsItaly has confirmed itself as one of the main targets of the DDoS attack campaign carried out by the hacktivist group NoName057(16) . According to what was declared directly by the collective, our country has…
Cyber NewsThe question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry has repeatedly attempted to provide a concrete answer, without ever reaching a definitive solution. From…
Cyber NewsThe BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by Picus Security details the group’s…












