Ultime news
SOAP Vulnerability in .NET Framework Allows Remote Code Execution
CVE-2025-55182 React Server Components Vulnerability Exploited
Top 25 Software Vulnerabilities 2025: MITRE CWE Ranking and Security Tips
The Future of Work: 4-Day Week with AI and Tech Advances
ARTEMIS Leads in AI-Powered Pentesting, Outperforming Human Experts
Apple Patches Critical WebKit Vulnerabilities in iOS Update
Cryptomixer Shut Down: Europol Cracks Down on $1.3B Bitcoin Mixing Service
Redazione RHC - December 2nd, 2025
888 Data Leaker: Ryanair Breach Exposed
Luca Stivali - December 2nd, 2025
WiFi Network Security: Protect Against Hacking with WPA3 and ARP Spoofing
Francesco Demarcus - December 2nd, 2025
ShadyPanda Malware Infects 4.3M Browsers with Chrome Edge Extensions
Redazione RHC - December 2nd, 2025
The Dark Side of Internet Control: Durov’s Warning
Sandro Sana - December 2nd, 2025
Phishing Attacks Surge in Black Friday Season: Stay Vigilant
Redazione RHC - December 2nd, 2025
Human Washing Machine Launched: Japan’s Science Unveils Unique Device
Redazione RHC - December 1st, 2025
Brazilian Systems Targeted in Sophisticated OAST Exploit Campaign
Redazione RHC - December 1st, 2025
Australian Man Jailed for Evil Twin Wi-Fi Scam Targeting Airline Passengers
Redazione RHC - December 1st, 2025
KrakenBite Phishing Service Exposed
Redazione RHC - December 1st, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeA flaw has been discovered in the foundation of the Java web ecosystem. Undertow , the high-performance web server that powers enterprise heavyweights like WildFly and JBoss EAP , has been hit by a critical…
CybercrimeIranian protesters chanted and marched through the streets until Friday morning, following a call from exiled former Prince Reza Pahlavi to demonstrate, despite the Iranian theocracy cutting off the country from the internet and international…
CybercrimeBackups are generally considered the last line of defense, but this week Veeam reminded us that backup systems themselves can become entry points for attacks. The company released security updates for Backup & Replication ,…
CybercrimeFor much of the past two decades, cybersecurity has been built on a simple assumption: malicious activity can be detected, analysed, and responded to before meaningful damage occurs. This assumption shaped everything from SOC design…
CybercrimeThe vulnerability, identified as CVE-2026-21858, which we recently reported on, affects approximately 100,000 servers worldwide, threatening to expose proprietary API keys, customer databases, and AI workflows. The vulnerability, with a CVSS score of 10, has…











