Ultime news
AI-Generated Scams: New Threats with Deepfake Photos and Videos
Microsoft Windows LNK Vulnerability Exploited by Hackers
Apache Tika Vulnerability CVE-2025-66516: Critical XXE Attack Risk
China Accuses US of Cyber Attacks, Denies Involvement in Brickstorm Malware
AI Browser Attack: Google Drive Wiper Threat Exposed
NATO Cyber Coalition Exercise: Enhancing Cyber Defense with 1,300 Experts
Critical vulnerability in the WordPress plugin W3 Total Cache. 430,000 sites at risk!
Redazione RHC - November 21st, 2025
Hundreds of robots on the march: China presents the new generation of humanoids
Redazione RHC - November 21st, 2025
Veeam launches Data Platform v13, redefining the standard for cyber resilience and advanced data protection.
Redazione RHC - November 20th, 2025
Happy birthday, Windows! 40 years of operating system history and still going strong.
Redazione RHC - November 20th, 2025
World Children’s Day: Children live in digital, but digital wasn’t designed for them.
Simone D'Agostino - November 20th, 2025
Huawei unveils HarmonyOS and the new HM740 laptop. Is Microsoft Office at risk?
Redazione RHC - November 20th, 2025
Meta and Google suspend construction of two undersea cables due to instability in the Red Sea
Redazione RHC - November 20th, 2025
Let the hunt begin! Critical 7-Zip bug puts millions of users at risk.
Redazione RHC - November 20th, 2025
Python to Rust: A More Secure Future for the Programming Language
Redazione RHC - November 19th, 2025
Multi-threaded Hacking: US Pioneers Automated Operations with AI Agents
Redazione RHC - November 19th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeWhatsApp, Meta’s messaging app with over 3 billion monthly active users, has begun introducing technical changes to mitigate several privacy vulnerabilities on user devices . The fixes, identified through independent research tools, were implemented without…
CybercrimeA recent incident saw an anonymous hacker leak a crucial security key used by Sony to safeguard the integrity of the chain of trust in the PlayStation 5 console. This security key, known as the…
CybercrimeA comparison test across six generations of Windows was conducted by YouTube channel TrigrZolt , which unexpectedly revealed a clear winner: Windows 8.1. Windows 11, on the other hand, performed worst in almost every test.…
CultureWhile the industry debates which neural network is the “smartest” and which framework is the “most modern,” decades-old technologies continue to quietly swirl beneath the surface of the banking industry . This year, COBOL turned…
CybercrimeOn Wednesday, December 31, Finnish authorities seized a cargo ship believed to be involved in the damage to an undersea telecommunications cable connecting Helsinki to Tallinn, Estonia. The action was triggered after a technical anomaly…











