Ultime news
54 Arrested in $Multi-Million ATM Jackpotting Scheme Linked to Tren de Aragua
The Birth of World Wide Web: How Tim Berners-Lee Created the First Website
WatchGuard Firewall Zero-Day Vulnerability CVE-2025-14733 Exploited
Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk
Google and Apple Embrace Interoperability with Android iOS Data Transfer
Ink Dragon Targets Europe: Exploiting SharePoint and IIS Vulnerabilities
React2Shell Vulnerability Exploited by China-Linked Hackers, Patch Now
Redazione RHC - December 6th, 2025
FreeBSD 15.0: Discover the Power of This Unix-like Operating System
Redazione RHC - December 6th, 2025
Cloudflare Blocks AI Bots: The Future of Internet Economy at Stake
Redazione RHC - December 5th, 2025
React2Shell Vulnerability: 8.7M Servers at Risk – CVE-2025-55182
Redazione RHC - December 5th, 2025
Cloudflare Just Broke the Internet… Again. Centralization Risks Exposed
Redazione RHC - December 5th, 2025
Chinese Cyber Spies Use Brickstorm Malware to Infiltrate Critical Networks
Redazione RHC - December 5th, 2025
Splunk Enterprise Vulnerability: CVE-2025-20386 and CVE-2025-20387
Redazione RHC - December 5th, 2025
Apache HTTP Server Update Fixes Critical Security Vulnerabilities
Redazione RHC - December 5th, 2025
Cyber Insurance: Why Basic Hygiene Matters
Redazione RHC - December 5th, 2025
Meta AI WhatsApp Investigation
Redazione RHC - December 5th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…
CybercrimeAfter a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…
CybercrimeCheck Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…
CybercrimeA recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…
CybercrimeOn January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…










