Ultime news
QR Code Phishing via HTML: New Attack Vector Emerges
Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now
GoBruteforcer Botnet Exploits AI-Generated Server Configs, Targets Crypto
When Attack Discovery Becomes Automated, Detection Stops Scaling
VMware ESXi VM Escape Exploit: Advanced Threats Revealed
Supply Chain Security: Protect Your Business from Cyber Threats
Job Scams on Social Media: How to Avoid Fake Remote Job Offers
Redazione RHC - December 29th, 2025
MongoDB Vulnerability CVE-2025-14847: Critical Memory Disclosure Bug
Redazione RHC - December 28th, 2025
UK Boosts Subsea Cable Protection with Autonomous Vessels
Redazione RHC - December 28th, 2025
China’s Humanoid Robot Industry Booms with UBtech’s Walker S2
Redazione RHC - December 28th, 2025
Cyber Criminals Recruit Insiders: Companies at Risk of Internal Threats
Redazione RHC - December 27th, 2025
US Data Center Battery Dependency: A Growing Concern for AI and Defense
Redazione RHC - December 27th, 2025
Uzbekistan License Plate Surveillance System Exposed Online
Redazione RHC - December 27th, 2025
Interpol Operation Sentinel Cracks Down on Cybercrime with 574 Arrests
Redazione RHC - December 27th, 2025
Villager Framework: AI-Powered Penetration Testing Tool
Redazione RHC - December 26th, 2025
TIME’s Machine of the Year: How Personal Computer Changed Society
Redazione RHC - December 26th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CyberpoliticsItaly has confirmed itself as one of the main targets of the DDoS attack campaign carried out by the hacktivist group NoName057(16) . According to what was declared directly by the collective, our country has…
innovationThe question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry has repeatedly attempted to provide a concrete answer, without ever reaching a definitive solution. From…
CybercrimeThe BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by Picus Security details the group’s…
CybercrimeA study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The study’s results were published by…
CybercrimeA new malware campaign has emerged in the macOS world, one that relies not on sophisticated exploits, but on good old-fashioned social engineering. It’s powered by the MacSync malware, distributed using the ” malware-as-a-service ”…











