Ultime news
PollyPolymer Revolutionizes Robotics with 3D Printed Flexible Components
GlassWorm Malware Targets macOS via Open VSX Extensions
AI Job Losses: Geoffrey Hinton Warns of Widespread Unemployment by 2026
NVIDIA Tegra X2 Vulnerability: Millions of Devices at Risk
China Regulates AI Chatbots with Human-like Interaction
The Dark Side of AI Rights: Why Experts Are Urging Caution
PuTTY Under Siege: Hackers Exploit Popular Client for SSH Attacks
Redazione RHC - December 22nd, 2025
OAuth Device Code Phishing: New Attack Vector for Account Takeover
Redazione RHC - December 22nd, 2025
DIG AI: The Dark Web’s New AI Tool for Cybercrime
Redazione RHC - December 21st, 2025
TikTok Accused of Illegally Tracking Users’ Data Across Apps
Redazione RHC - December 21st, 2025
Naftali Bennett Telegram Account Hacked in Israel Politics
Redazione RHC - December 21st, 2025
Cisco Secure Email Gateway Vulnerability Exploited: Act Now
Redazione RHC - December 21st, 2025
Airbus Eyes Sovereign Cloud to Mitigate US Data Risks
Redazione RHC - December 21st, 2025
North Korean Hackers Steal $2 Billion in Crypto, Targeting DeFi Sector
Redazione RHC - December 21st, 2025
Kimwolf Botnet: The Rising Threat of DDoS Attacks on IoT Devices
Redazione RHC - December 20th, 2025
54 Arrested in $Multi-Million ATM Jackpotting Scheme Linked to Tren de Aragua
Redazione RHC - December 20th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CultureMandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…
CybercrimeNo worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…
CybercrimeAfter a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…
CybercrimeCheck Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…











