Ultime news
Bypassing AI Safety: EchoGram Exposes Vulnerabilities in LLM Defenses
E-Note Shutdown: Major Blow to Cybercrime and Ransomware
French Police Arrest Suspect in Cyberattack on Interior Ministry
Google Unveils Gemini 3 Flash AI Model, Rivals OpenAI GPT-5.2
Rise of AI Degrees: Students Shift from Computer Science to AI
SonicWall SMA1000 Vulnerability: Critical Security Patch Released
Gulf States’ Digital Transformation: A New Era of Innovation and Security
Matteo Giada - December 5th, 2025
Neurodivergence in Cybersecurity: A Hidden Competitive Advantage
Fabrizio Saviano - December 5th, 2025
Leroy Merlin Cyberattack Exposes Personal Data of French Customers
Redazione RHC - December 4th, 2025
Anonymity for Sale: Russian SIM Card Market Thrives Amid Regulations
Redazione RHC - December 4th, 2025
Hackers Compromise 120k IP Cameras for Pornographic Videos
Redazione RHC - December 4th, 2025
Microsoft Fixes Old Windows LNK Vulnerability Exploited in Attacks
Redazione RHC - December 4th, 2025
Critical React Server Vulnerability: Update Now to Prevent RCE Attacks
Redazione RHC - December 4th, 2025
Critical Vulnerability in King Addons for Elementor Exploited
Redazione RHC - December 4th, 2025
Google Discover AI Headlines: Revolutionizing News Feed or Clickbait Nightmare?
Redazione RHC - December 4th, 2025
Storm-0900 Phishing Campaign Spreads XWorm Malware
Redazione RHC - December 4th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…
CybercrimeAfter a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…
CybercrimeCheck Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…
CybercrimeA recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…
CybercrimeOn January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…











