Ultime news
Malaysia Cracks Down on Bitcoin Mining Thefts
Australia Bans Social Media for Under 16s: What You Need to Know
Palo Alto Networks VPN Vulnerability Exploited by Hackers
US Brothers Accused of Destroying 96 Databases with AI
US Seizes Phishing Site Used by Myanmar Scammers to Steal Millions
Digital Literacy in Schools: The Key to Unlocking Students’ Potential
ToddyCat APT Group Targets Microsoft 365 Email Security
Redazione RHC - November 27th, 2025
Tor Boosts Security with Counter Galois Onion CGO Encryption
Redazione RHC - November 27th, 2025
WormGPT 4: AI-Powered Cybercrime Tools on the Rise
Redazione RHC - November 26th, 2025
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Redazione RHC - November 26th, 2025
Investment Scam Alert: How to Avoid Losing Thousands
Redazione RHC - November 26th, 2025
Trump Launches Genesis AI Mission to Revolutionize US Science
Redazione RHC - November 26th, 2025
Cybersecurity in the Middle East: Egitto and Qatar Lead the Way
Redazione RHC - November 26th, 2025
US States Crack Down on VPNs and Online Privacy for Minors
Redazione RHC - November 26th, 2025
Logitech Hit by Clop Ransomware Attack, Data Breach Exposed
Redazione RHC - November 26th, 2025
Malware Uses Finger Command to Infect Windows Devices
Redazione RHC - November 26th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeOpenAI, the developer of ChatGPT, has announced the search for a new Chief Security Officer . The position, with an annual salary of $555,000, will be directly responsible for mitigating risks associated with artificial intelligence…
CybercrimeDuring the first half of December, a Chinese company assembling devices for Apple was hit by an advanced cyberattack that may have exposed sensitive information related to a production line. The incident was reported by…
CybercrimeThis article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable for its ability to generate…
CybercrimeA new report details a critical vulnerability discovered by security researcher Joseph Goydish in Apple’s WebKit engine. This security flaw, if exploited in conjunction with other exploits, could allow attackers to execute arbitrary code on…
CybercrimeWhen it comes to cybersecurity, it’s easy to fall into the trap of thinking that problems are always far away, that they only affect others. But the reality is that a vulnerability is always around…











