Ultime news
Meta AI WhatsApp Investigation
Gulf States’ Digital Transformation: A New Era of Innovation and Security
Neurodivergence in Cybersecurity: A Hidden Competitive Advantage
Leroy Merlin Cyberattack Exposes Personal Data of French Customers
Anonymity for Sale: Russian SIM Card Market Thrives Amid Regulations
Hackers Compromise 120k IP Cameras for Pornographic Videos
Critical vulnerability in the WordPress plugin W3 Total Cache. 430,000 sites at risk!
Redazione RHC - November 21st, 2025
Hundreds of robots on the march: China presents the new generation of humanoids
Redazione RHC - November 21st, 2025
Veeam launches Data Platform v13, redefining the standard for cyber resilience and advanced data protection.
Redazione RHC - November 20th, 2025
Happy birthday, Windows! 40 years of operating system history and still going strong.
Redazione RHC - November 20th, 2025
World Children’s Day: Children live in digital, but digital wasn’t designed for them.
Simone D'Agostino - November 20th, 2025
Huawei unveils HarmonyOS and the new HM740 laptop. Is Microsoft Office at risk?
Redazione RHC - November 20th, 2025
Meta and Google suspend construction of two undersea cables due to instability in the Red Sea
Redazione RHC - November 20th, 2025
Let the hunt begin! Critical 7-Zip bug puts millions of users at risk.
Redazione RHC - November 20th, 2025
Python to Rust: A More Secure Future for the Programming Language
Redazione RHC - November 19th, 2025
Multi-threaded Hacking: US Pioneers Automated Operations with AI Agents
Redazione RHC - November 19th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeThis article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable for its ability to generate…
CybercrimeA new report details a critical vulnerability discovered by security researcher Joseph Goydish in Apple’s WebKit engine. This security flaw, if exploited in conjunction with other exploits, could allow attackers to execute arbitrary code on…
CybercrimeWhen it comes to cybersecurity, it’s easy to fall into the trap of thinking that problems are always far away, that they only affect others. But the reality is that a vulnerability is always around…
CybercrimeFraudulent job ads promising easy money and remote work continue to flood social media, particularly in the Middle East and North Africa . Under the guise of part-time jobs that require no experience , scammers…
CybercrimeThe cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…











