Ultime news
Iran Protests Escalate as Reza Pahlavi Calls for Action Against Government
Taiwan Citizens Accused in China of Smuggling and Cable Sabotage
QR Code Phishing via HTML: New Attack Vector Emerges
Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now
GoBruteforcer Botnet Exploits AI-Generated Server Configs, Targets Crypto
When Attack Discovery Becomes Automated, Detection Stops Scaling
TurboDiffusion: AI Video Generation Accelerated Up to 200 Times
Redazione RHC - December 29th, 2025
OpenAI to Introduce ChatGPT Ads, Revolutionizing AI-Powered Marketing
Redazione RHC - December 29th, 2025
Job Scams on Social Media: How to Avoid Fake Remote Job Offers
Redazione RHC - December 29th, 2025
MongoDB Vulnerability CVE-2025-14847: Critical Memory Disclosure Bug
Redazione RHC - December 28th, 2025
UK Boosts Subsea Cable Protection with Autonomous Vessels
Sandro Sana - December 28th, 2025
China’s Humanoid Robot Industry Booms with UBtech’s Walker S2
Redazione RHC - December 28th, 2025
Cyber Criminals Recruit Insiders: Companies at Risk of Internal Threats
Redazione RHC - December 27th, 2025
US Data Center Battery Dependency: A Growing Concern for AI and Defense
Redazione RHC - December 27th, 2025
Uzbekistan License Plate Surveillance System Exposed Online
Redazione RHC - December 27th, 2025
Interpol Operation Sentinel Cracks Down on Cybercrime with 574 Arrests
Redazione RHC - December 27th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
Cyber NewsThe story ofIlya Lichtenstein, the hacker responsible for one of the largest cyber attacks ever carried out against cryptocurrencies, reads like an episode of a TV series, yet it is absolutely real. After being released,…
Cyber NewsItaly has confirmed itself as one of the main targets of the DDoS attack campaign carried out by the hacktivist group NoName057(16) . According to what was declared directly by the collective, our country has…
Cyber NewsThe question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry has repeatedly attempted to provide a concrete answer, without ever reaching a definitive solution. From…
Cyber NewsThe BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by Picus Security details the group’s…
Cyber NewsA study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The study’s results were published by…












