Ultime news
E-Note Shutdown: Major Blow to Cybercrime and Ransomware
French Police Arrest Suspect in Cyberattack on Interior Ministry
Google Unveils Gemini 3 Flash AI Model, Rivals OpenAI GPT-5.2
Rise of AI Degrees: Students Shift from Computer Science to AI
SonicWall SMA1000 Vulnerability: Critical Security Patch Released
HPE OneView Vulnerability CVE-2025-37164: Critical Security Update Required
Microsoft Fixes Old Windows LNK Vulnerability Exploited in Attacks
Redazione RHC - December 4th, 2025
Critical React Server Vulnerability: Update Now to Prevent RCE Attacks
Redazione RHC - December 4th, 2025
Critical Vulnerability in King Addons for Elementor Exploited
Redazione RHC - December 4th, 2025
Google Discover AI Headlines: Revolutionizing News Feed or Clickbait Nightmare?
Redazione RHC - December 4th, 2025
Storm-0900 Phishing Campaign Spreads XWorm Malware
Redazione RHC - December 4th, 2025
Windows 10 Still Running on 1 Billion PCs, Upgrade to Windows 11 Urged
Redazione RHC - December 4th, 2025
Secure AI Integration in OT Systems: Key Principles and Best Practices
Redazione RHC - December 4th, 2025
Aisuru Botnet Unleashes 29.7 Tbps DDoS Attack, Cloudflare Mitigates
Redazione RHC - December 3rd, 2025
Critical Vulnerability in Iskra iHUB Devices Exposed
Redazione RHC - December 3rd, 2025
Roblox Down Russia
Redazione RHC - December 3rd, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeResearchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…
CybercrimeElon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…
CultureMandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…
CybercrimeNo worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…











