Ultime news
OSINT Ethics and Legality: Navigating Open Source Intelligence
The Psychology of Passwords: Why Weak Passwords Persist
Russian Cyber Operations Shift to Targeting Western Critical Infrastructure
Google Chrome Security Update Fixes Critical Vulnerabilities
Spiderman Phishing Kit Targets European Banks and Crypto Users
AI Smart Glasses for Police: Efficient Vehicle Checks in China
Managing AI Agents: Mitigating Security Risks in Autonomous Systems
Redazione RHC - December 3rd, 2025
Mistral AI Unveils Powerful Open Source Models for Advanced AI Applications
Redazione RHC - December 3rd, 2025
Maha Grass APT Group Unleashes StreamSpy Malware Attacks
Redazione RHC - December 3rd, 2025
Digital Crime Among Teenagers: Temporary Involvement
Redazione RHC - December 2nd, 2025
Porsche Russia Alarm Issues Spark Widespread Vehicle Immobilization
Redazione RHC - December 2nd, 2025
Cryptomixer Shut Down: Europol Cracks Down on $1.3B Bitcoin Mixing Service
Redazione RHC - December 2nd, 2025
888 Data Leaker: Ryanair Breach Exposed
Luca Stivali - December 2nd, 2025
WiFi Network Security: Protect Against Hacking with WPA3 and ARP Spoofing
Francesco Demarcus - December 2nd, 2025
ShadyPanda Malware Infects 4.3M Browsers with Chrome Edge Extensions
Redazione RHC - December 2nd, 2025
The Dark Side of Internet Control: Durov’s Warning
Sandro Sana - December 2nd, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…
CybercrimeAfter a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…
CybercrimeCheck Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…
CybercrimeA recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…
CybercrimeOn January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…











