Ultime news
The Rise of Digital Walls: How National Sovereignty Threatens Global Internet
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Smart TV Spying: Major Brands Accused of Collecting User Data
Phishing Campaigns Exploit File Sharing Services
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025
Cybersecurity Certifications: Boost Your Career with CompTIA Security+
Matteo Schirinzi - December 10th, 2025
US Allows Nvidia to Sell Advanced AI Chips to China, Easing Export Restrictions
Redazione RHC - December 9th, 2025
Taiwan Cracks Down on Submarine Cable Sabotage with New Laws
Redazione RHC - December 9th, 2025
Ransomware Attacks Decline in 2024, But Threat Remains High with $734M in Ransom
Redazione RHC - December 9th, 2025
Embracing Vulnerability for Authentic Leadership and Team Growth
Daniela Linda - December 9th, 2025
CISA Warns: Avoid Personal VPNs for Secure Mobile Communications
Redazione RHC - December 9th, 2025
SAP Security Update Fixes Critical Code Injection Vulnerability in Solution Manager
Redazione RHC - December 9th, 2025
Passwordless Authentication: The Future of Secure Online Access
Redazione RHC - December 9th, 2025
Critical PromptPwnd Vulnerability Exposes AI-Powered GitLab, GitHub Pipelines
Redazione RHC - December 9th, 2025
LLM-Powered Malware: The Future of Autonomous Cyber Threats
Redazione RHC - December 9th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…
CybercrimeAfter a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…
CybercrimeCheck Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…
CybercrimeA recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…
CybercrimeOn January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…











