Ultime news
React2Shell Vulnerability Exploited by China-Linked Hackers, Patch Now
FreeBSD 15.0: Discover the Power of This Unix-like Operating System
Cloudflare Blocks AI Bots: The Future of Internet Economy at Stake
React2Shell Vulnerability: 8.7M Servers at Risk – CVE-2025-55182
Cloudflare Just Broke the Internet… Again. Centralization Risks Exposed
Chinese Cyber Spies Use Brickstorm Malware to Infiltrate Critical Networks
Google Gemini Improves AI-Generated Image Verification
Redazione RHC - November 23rd, 2025
“We Want to Hack You Again!” NSO Group Rejects WhatsApp’s Pegasus Lawsuit
Redazione RHC - November 22nd, 2025
Oracle under attack: Pre-auth RCE vulnerability discovered that compromises entire systems
Redazione RHC - November 22nd, 2025
CrowdStrike Insider Fired for Providing Sensitive Data to Criminal Hackers
Redazione RHC - November 22nd, 2025
Sysmon will finally be integrated into Windows 11 and Windows Server 2025 in 2026
Redazione RHC - November 22nd, 2025
Sneaky2FA: The phishing scam that steals credentials with browser-in-the-browser attacks
Redazione RHC - November 22nd, 2025
TamperedChef: Malware via Fake App Installers
Redazione RHC - November 21st, 2025
Whoever took down Cloudflare during the outage put their infrastructure at risk
Redazione RHC - November 21st, 2025
Critical Vulnerability in Azure Bastion Scores 10! When RDP and SSH in the Cloud Are Checkmated
Redazione RHC - November 21st, 2025
Risk averted for millions of Microsoft users! The critical vulnerability in Microsoft SharePoint 9.8
Redazione RHC - November 21st, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeDuring the first half of December, a Chinese company assembling devices for Apple was hit by an advanced cyberattack that may have exposed sensitive information related to a production line. The incident was reported by…
CybercrimeThis article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable for its ability to generate…
CybercrimeA new report details a critical vulnerability discovered by security researcher Joseph Goydish in Apple’s WebKit engine. This security flaw, if exploited in conjunction with other exploits, could allow attackers to execute arbitrary code on…
CybercrimeWhen it comes to cybersecurity, it’s easy to fall into the trap of thinking that problems are always far away, that they only affect others. But the reality is that a vulnerability is always around…
CybercrimeFraudulent job ads promising easy money and remote work continue to flood social media, particularly in the Middle East and North Africa . Under the guise of part-time jobs that require no experience , scammers…











