Ultime news
Critical Windows Vulnerability CVE-2025-59230 Exposed
Women in Cybersecurity: Breaking Down Barriers and Stereotypes
Storm-0249 Uses DLL Sideloading in Highly Targeted Attacks
VS Code Extensions Infected with Sophisticated Malware via Typosquatting
NVIDIA Merlin Security Update: Fixing High-Severity Vulnerabilities
How Profanity Varies Across Social Media and Cultures
Leonardo’s Michelangelo Dome: AI-Powered Defense Against Hypersonic Threats
Redazione RHC - November 30th, 2025
Windows 11 Password Issue: Microsoft Warns of Invisible Icon Bug
Redazione RHC - November 30th, 2025
CISA Warns of OpenPLC ScadaBR Vulnerability Exploitation
Redazione RHC - November 30th, 2025
The Power of A* Algorithm in Artificial Intelligence and Robotics
Redazione RHC - November 30th, 2025
WhatsApp Messages Contain Hidden GPS Data, Expert Warns
Redazione RHC - November 30th, 2025
DeepSeekMath-V2 Revolutionizes Math with AI-Powered Proof Verification
Redazione RHC - November 30th, 2025
Shai-Hulud Attack: npm Supply Chain Compromised Again
Redazione RHC - November 30th, 2025
ChatGPT to Introduce Targeted Ads, Changing Monetization Strategy
Redazione RHC - November 29th, 2025
GitLab Security Updates Fix High-Severity Vulnerabilities CVE-2024-9183
Redazione RHC - November 29th, 2025
Apache SkyWalking Vulnerability Exposes Users to XSS Attacks
Redazione RHC - November 29th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…
CybercrimeAfter a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…
CybercrimeCheck Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…
CybercrimeA recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…
CybercrimeOn January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…











