Ultime news
San Francisco Power Outage Exposes Waymo Self-Driving Car Vulnerabilities
Microsoft Shifts Activation Process: What It Means for Air-Gapped Systems
PuTTY Under Siege: Hackers Exploit Popular Client for SSH Attacks
OAuth Device Code Phishing: New Attack Vector for Account Takeover
DIG AI: The Dark Web’s New AI Tool for Cybercrime
TikTok Accused of Illegally Tracking Users’ Data Across Apps
US Seizes Phishing Site Used by Myanmar Scammers to Steal Millions
Redazione RHC - December 8th, 2025
Digital Literacy in Schools: The Key to Unlocking Students’ Potential
Inva Malaj - December 8th, 2025
OSINT Investigation: Uncovering Digital Evidence
Alexandro Irace - December 8th, 2025
Europe’s Digital Sovereignty: The Risks of Relying on Non-European Tech
Redazione RHC - December 7th, 2025
Apple’s Major Shake-Up: Johny Srouji Leaves as Senior VP of Hardware Technologies
Redazione RHC - December 7th, 2025
Cloudflare Outage: 25 Minutes of Chaos Due to React Server Issue
Redazione RHC - December 7th, 2025
Microsoft CEO on AI Challenges
Redazione RHC - December 7th, 2025
Pat Gelsinger on Quantum Computing Impact on AI Future
Redazione RHC - December 7th, 2025
AI-Generated Scams: New Threats with Deepfake Photos and Videos
Redazione RHC - December 7th, 2025
Microsoft Windows LNK Vulnerability Exploited by Hackers
Redazione RHC - December 6th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeResearchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…
CybercrimeElon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…
CultureMandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…
CybercrimeNo worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…











