Ultime news
Women in Cybersecurity: Breaking Down Barriers and Stereotypes
Storm-0249 Uses DLL Sideloading in Highly Targeted Attacks
VS Code Extensions Infected with Sophisticated Malware via Typosquatting
NVIDIA Merlin Security Update: Fixing High-Severity Vulnerabilities
How Profanity Varies Across Social Media and Cultures
GhostFrame Phishing Kit: New Stealthy PhaaS Threat Emerges
DeepSeekMath-V2 Revolutionizes Math with AI-Powered Proof Verification
Redazione RHC - November 30th, 2025
Shai-Hulud Attack: npm Supply Chain Compromised Again
Redazione RHC - November 30th, 2025
ChatGPT to Introduce Targeted Ads, Changing Monetization Strategy
Redazione RHC - November 29th, 2025
GitLab Security Updates Fix High-Severity Vulnerabilities CVE-2024-9183
Redazione RHC - November 29th, 2025
Apache SkyWalking Vulnerability Exposes Users to XSS Attacks
Redazione RHC - November 29th, 2025
Bloody Wolf Attacks Central Asia with NetSupport RAT via Java Exploits
Redazione RHC - November 29th, 2025
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
Redazione RHC - November 28th, 2025
CEO Scam: How to Protect Your Company from Business Email Compromise
Redazione RHC - November 28th, 2025
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Redazione RHC - November 28th, 2025
11.7% of jobs could be replaced by artificial intelligence
Redazione RHC - November 28th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeResearchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…
CybercrimeElon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…
CultureMandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…
CybercrimeNo worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…











