Ultime news
Microsoft CEO on AI Challenges
Pat Gelsinger on Quantum Computing Impact on AI Future
AI-Generated Scams: New Threats with Deepfake Photos and Videos
Microsoft Windows LNK Vulnerability Exploited by Hackers
Apache Tika Vulnerability CVE-2025-66516: Critical XXE Attack Risk
China Accuses US of Cyber Attacks, Denies Involvement in Brickstorm Malware
GDPR Data Breach: Email Errors and Consequences
Stefano Gazzella - November 25th, 2025
Ettore Accenti: The Italian Tech Pioneer Who Brought Intel to Italy
Carlo Denza - November 25th, 2025
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Redazione RHC - November 25th, 2025
Anthropic Releases Claude Opus 4.5: AI Model for Enhanced Productivity
Redazione RHC - November 24th, 2025
Alibaba Qwen3Max Dominates AI Market with Rapid Growth
Redazione RHC - November 24th, 2025
Digital Surveillance at Work: The Rise of Algorithmic Monitoring
Redazione RHC - November 24th, 2025
Windows Server Vulnerability Exploited: ShadowPad Malware Deployed
Redazione RHC - November 24th, 2025
Salesforce Data Breach: ShinyHunters Hack Gainsight Integration
Redazione RHC - November 24th, 2025
BadAudio Discovered: Ghost Malware Used by APT24 for Three Years Undetected
Redazione RHC - November 24th, 2025
Satoshi Nakamoto’s Net Worth Drops 34% as Cryptocurrency Crash
Redazione RHC - November 24th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeThis article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable for its ability to generate…
CybercrimeA new report details a critical vulnerability discovered by security researcher Joseph Goydish in Apple’s WebKit engine. This security flaw, if exploited in conjunction with other exploits, could allow attackers to execute arbitrary code on…
CybercrimeWhen it comes to cybersecurity, it’s easy to fall into the trap of thinking that problems are always far away, that they only affect others. But the reality is that a vulnerability is always around…
CybercrimeFraudulent job ads promising easy money and remote work continue to flood social media, particularly in the Middle East and North Africa . Under the guise of part-time jobs that require no experience , scammers…
CybercrimeThe cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…











