Ultime news
China’s Humanoid Robot Industry Booms with UBtech’s Walker S2
Cyber Criminals Recruit Insiders: Companies at Risk of Internal Threats
US Data Center Battery Dependency: A Growing Concern for AI and Defense
Uzbekistan License Plate Surveillance System Exposed Online
Interpol Operation Sentinel Cracks Down on Cybercrime with 574 Arrests
Villager Framework: AI-Powered Penetration Testing Tool
SOAP Vulnerability in .NET Framework Allows Remote Code Execution
Redazione RHC - December 14th, 2025
CVE-2025-55182 React Server Components Vulnerability Exploited
Redazione RHC - December 13th, 2025
Top 25 Software Vulnerabilities 2025: MITRE CWE Ranking and Security Tips
Redazione RHC - December 13th, 2025
The Future of Work: 4-Day Week with AI and Tech Advances
Redazione RHC - December 13th, 2025
ARTEMIS Leads in AI-Powered Pentesting, Outperforming Human Experts
Redazione RHC - December 13th, 2025
Apple Patches Critical WebKit Vulnerabilities in iOS Update
Redazione RHC - December 13th, 2025
Kali Linux 2025.4: Discover the Power of Wayland and Enhanced Security Tools
Redazione RHC - December 12th, 2025
French Interior Ministry Hit by Cyberattack, Data Security at Risk
Redazione RHC - December 12th, 2025
IRS.GOV: alleged data breach affects the accounts of 18 million citizens
Redazione RHC - December 12th, 2025
Amnesty International Launches .onion Site for Secure Access to Human Rights Info
Redazione RHC - December 12th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeResearchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…
CybercrimeElon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…
CultureMandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…
CybercrimeNo worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…











