Ultime news
Windows 11 Password Issue: Microsoft Warns of Invisible Icon Bug
CISA Warns of OpenPLC ScadaBR Vulnerability Exploitation
The Power of A* Algorithm in Artificial Intelligence and Robotics
WhatsApp Messages Contain Hidden GPS Data, Expert Warns
DeepSeekMath-V2 Revolutionizes Math with AI-Powered Proof Verification
Shai-Hulud Attack: npm Supply Chain Compromised Again
Let’s discover injections explained in a simple way
Davide Cavallini - November 15th, 2025
A journey into the world of OT/ICS: What are SCADA servers?
Redazione RHC - November 15th, 2025
Quishing: What it is, how it works, and how to protect yourself
Redazione RHC - November 15th, 2025
Password Managers: A Complete Guide to Choosing and Using Them
Redazione RHC - November 15th, 2025
Discovering the NIS2 Directive: Security and Resilience of Digital Systems in the European Union
Riccardo Nuti - November 15th, 2025
Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage
Redazione RHC - November 15th, 2025
North Korea reorganizes its intelligence with a new agency
Redazione RHC - November 15th, 2025
Cognitive Biases and Cybersecurity: The Fatal Fallacy of “I Have Nothing to Hide”
Fabrizio Saviano - November 15th, 2025
Did they give you a digital photo frame? It’s more than just family memories.
Redazione RHC - November 15th, 2025
What are PsyOps? Exploring mind manipulation in the digital age.
Redazione RHC - November 15th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerability in the Linux kernel has caused…

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worrying security flaw in its…











