Ultime news
The Birth of World Wide Web: How Tim Berners-Lee Created the First Website
WatchGuard Firewall Zero-Day Vulnerability CVE-2025-14733 Exploited
Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk
Google and Apple Embrace Interoperability with Android iOS Data Transfer
Ink Dragon Targets Europe: Exploiting SharePoint and IIS Vulnerabilities
Bypassing AI Safety: EchoGram Exposes Vulnerabilities in LLM Defenses
Chinese Cyber Spies Use Brickstorm Malware to Infiltrate Critical Networks
Redazione RHC - December 5th, 2025
Splunk Enterprise Vulnerability: CVE-2025-20386 and CVE-2025-20387
Redazione RHC - December 5th, 2025
Apache HTTP Server Update Fixes Critical Security Vulnerabilities
Redazione RHC - December 5th, 2025
Cyber Insurance: Why Basic Hygiene Matters
Redazione RHC - December 5th, 2025
Meta AI WhatsApp Investigation
Redazione RHC - December 5th, 2025
Gulf States’ Digital Transformation: A New Era of Innovation and Security
Matteo Giada - December 5th, 2025
Neurodivergence in Cybersecurity: A Hidden Competitive Advantage
Fabrizio Saviano - December 5th, 2025
Leroy Merlin Cyberattack Exposes Personal Data of French Customers
Redazione RHC - December 4th, 2025
Anonymity for Sale: Russian SIM Card Market Thrives Amid Regulations
Redazione RHC - December 4th, 2025
Hackers Compromise 120k IP Cameras for Pornographic Videos
Redazione RHC - December 4th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeResearchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…
CybercrimeElon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…
CultureMandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…
CybercrimeNo worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…











