Ultime news
Cisco Secure Email Gateway Vulnerability Exploited: Act Now
Airbus Eyes Sovereign Cloud to Mitigate US Data Risks
North Korean Hackers Steal $2 Billion in Crypto, Targeting DeFi Sector
Kimwolf Botnet: The Rising Threat of DDoS Attacks on IoT Devices
54 Arrested in $Multi-Million ATM Jackpotting Scheme Linked to Tren de Aragua
The Birth of World Wide Web: How Tim Berners-Lee Created the First Website
China Accuses US of Cyber Attacks, Denies Involvement in Brickstorm Malware
Redazione RHC - December 6th, 2025
AI Browser Attack: Google Drive Wiper Threat Exposed
Redazione RHC - December 6th, 2025
NATO Cyber Coalition Exercise: Enhancing Cyber Defense with 1,300 Experts
Redazione RHC - December 6th, 2025
Microsoft 365 Price Hike: What You Need to Know About the 2026 Increase
Redazione RHC - December 6th, 2025
React2Shell Vulnerability Exploited by China-Linked Hackers, Patch Now
Redazione RHC - December 6th, 2025
FreeBSD 15.0: Discover the Power of This Unix-like Operating System
Redazione RHC - December 6th, 2025
Cloudflare Blocks AI Bots: The Future of Internet Economy at Stake
Redazione RHC - December 5th, 2025
React2Shell Vulnerability: 8.7M Servers at Risk – CVE-2025-55182
Redazione RHC - December 5th, 2025
Cloudflare Just Broke the Internet… Again. Centralization Risks Exposed
Redazione RHC - December 5th, 2025
Chinese Cyber Spies Use Brickstorm Malware to Infiltrate Critical Networks
Redazione RHC - December 5th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeElon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…
CultureMandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…
CybercrimeNo worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…
CybercrimeAfter a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…










