Ultime news
Phishing Campaigns Exploit File Sharing Services
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025
MS13-089 Ransomware: Double Extortion Without Encryption
San Francisco Power Outage Exposes Waymo Self-Driving Car Vulnerabilities
Microsoft Shifts Activation Process: What It Means for Air-Gapped Systems
Meta AI WhatsApp Investigation
Redazione RHC - December 5th, 2025
Gulf States’ Digital Transformation: A New Era of Innovation and Security
Matteo Giada - December 5th, 2025
Neurodivergence in Cybersecurity: A Hidden Competitive Advantage
Fabrizio Saviano - December 5th, 2025
Leroy Merlin Cyberattack Exposes Personal Data of French Customers
Redazione RHC - December 4th, 2025
Anonymity for Sale: Russian SIM Card Market Thrives Amid Regulations
Redazione RHC - December 4th, 2025
Hackers Compromise 120k IP Cameras for Pornographic Videos
Agostino Pellegrino - December 4th, 2025
Microsoft Fixes Old Windows LNK Vulnerability Exploited in Attacks
Massimiliano Brolli - December 4th, 2025
Critical React Server Vulnerability: Update Now to Prevent RCE Attacks
Agostino Pellegrino - December 4th, 2025
Critical Vulnerability in King Addons for Elementor Exploited
Massimiliano Brolli - December 4th, 2025
Google Discover AI Headlines: Revolutionizing News Feed or Clickbait Nightmare?
Redazione RHC - December 4th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
Cyber NewsThe recent discovery of a vulnerability in ServiceNow’s AI platform has shaken the cybersecurity industry. This flaw, characterized by an extremely high severity score, allowed unauthenticated attackers to impersonate any corporate user. To launch the…
CybercrimeA recent leak revealed 149 million logins and passwords exposed online , including accounts for financial services, social media, gaming, and dating sites. The discovery was made by researcher Jeremiah Fowler and shared with ExpressVPN.…
CybercrimePixelCode began as a research project exploring a hidden technique for storing binary data within images or videos . Instead of leaving a plaintext executable, the file is converted into pixel data, transforming each byte…
Cyber NewsSecurity researchers have recently observed a worrying evolution in the offensive tactics attributed to North Korean-linked actors as part of the campaign known as Contagious Interview : no longer simple fake job interview scams, but…
Cyber NewsKhaby Lame, the world’s most followed Italian creator and now a global social media icon, has taken a step that could mark a turning point in the history of the digital economy. According to several…












