Ultime news
CVE-2026-21858: n8n Vulnerability Exposes Thousands of Servers to RCE
Malware PHALT#BLYX Uses Social Engineering and MSBuild to Infect Systems
Disable Windows 11 AI Features Easily with RemoveWindowsAI Tool
DevSecOps: Integrating Security into Your Development Process
Critical RCE Vulnerability in D-Link DSL Routers – Update Now
Critical n8n Vulnerability: Update Now to Prevent RCE Attacks
Uzbekistan License Plate Surveillance System Exposed Online
Redazione RHC - December 27th, 2025
Interpol Operation Sentinel Cracks Down on Cybercrime with 574 Arrests
Redazione RHC - December 27th, 2025
Villager Framework: AI-Powered Penetration Testing Tool
Redazione RHC - December 26th, 2025
TIME’s Machine of the Year: How Personal Computer Changed Society
Redazione RHC - December 26th, 2025
Livewire Vulnerability Exposed: 130k Apps at Risk of Remote Code Execution
Redazione RHC - December 26th, 2025
Microsoft Boosts BitLocker with Hardware Acceleration for Enhanced Security
Redazione RHC - December 25th, 2025
DriverFixer0428: macOS Credential Stealer Linked to North Korea
Redazione RHC - December 25th, 2025
A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad
Redazione RHC - December 25th, 2025
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - December 24th, 2025
Nezha Malware: Abusing Legitimate Tools for Remote Access
Redazione RHC - December 24th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
innovationThe question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry has repeatedly attempted to provide a concrete answer, without ever reaching a definitive solution. From…
CybercrimeThe BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by Picus Security details the group’s…
CybercrimeA study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The study’s results were published by…
CybercrimeA new malware campaign has emerged in the macOS world, one that relies not on sophisticated exploits, but on good old-fashioned social engineering. It’s powered by the MacSync malware, distributed using the ” malware-as-a-service ”…
CybercrimeA sophisticated proxyjacking campaign is targeting systems in South Korea, attributed to the actor Larva-25012 , which distributes proxyware disguised as legitimate Notepad++ installers. The campaign demonstrates significant technical evolution, using process injection in explorer.exe…











