Ultime news
Salt Typhoon Hackers Exposed: Cisco Training Led to Global Telecom Breaches
Critical Red Hat OpenShift GitOps Vulnerability Exposed
FortiGate Vulnerability Exploited: Update Now to Prevent SSO Attacks
Shannon: Autonomous Penetration Testing with AI
Protecting Loved Ones from Scams and Financial Abuse
Critical Windows Vulnerability CVE-2025-59230 Exposed
ADC Aerospace Hit by Play Ransomware Attack, Data Breach Feared
Redazione RHC - December 1st, 2025
Microsoft 365 Security Risk: Interface Poisoning Attacks
Massimiliano Dal Cero - December 1st, 2025
Calendar Subscriptions: A Hidden Danger in Your Digital Life
Redazione RHC - December 1st, 2025
Airbus A320 Recall Due to ELAC System Failure Caused by Solar Flares
Redazione RHC - December 1st, 2025
OpenAI Faces Fierce Competition from Google’s Gemini 3
Redazione RHC - December 1st, 2025
Leonardo’s Michelangelo Dome: AI-Powered Defense Against Hypersonic Threats
Redazione RHC - November 30th, 2025
Windows 11 Password Issue: Microsoft Warns of Invisible Icon Bug
Redazione RHC - November 30th, 2025
CISA Warns of OpenPLC ScadaBR Vulnerability Exploitation
Redazione RHC - November 30th, 2025
The Power of A* Algorithm in Artificial Intelligence and Robotics
Redazione RHC - November 30th, 2025
WhatsApp Messages Contain Hidden GPS Data, Expert Warns
Redazione RHC - November 30th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeResearchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…
CybercrimeElon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…
CultureMandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…
CybercrimeNo worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…











