Ultime news
Cryptomixer Shut Down: Europol Cracks Down on $1.3B Bitcoin Mixing Service
888 Data Leaker: Ryanair Breach Exposed
WiFi Network Security: Protect Against Hacking with WPA3 and ARP Spoofing
ShadyPanda Malware Infects 4.3M Browsers with Chrome Edge Extensions
The Dark Side of Internet Control: Durov’s Warning
Phishing Attacks Surge in Black Friday Season: Stay Vigilant
Discovering the NIS2 Directive: Security and Resilience of Digital Systems in the European Union
Riccardo Nuti - November 15th, 2025
Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage
Redazione RHC - November 15th, 2025
North Korea reorganizes its intelligence with a new agency
Redazione RHC - November 15th, 2025
Cognitive Biases and Cybersecurity: The Fatal Fallacy of “I Have Nothing to Hide”
Fabrizio Saviano - November 15th, 2025
Did they give you a digital photo frame? It’s more than just family memories.
Redazione RHC - November 15th, 2025
What are PsyOps? Exploring mind manipulation in the digital age.
Redazione RHC - November 15th, 2025
Understanding Firewalls: The First Line of Defense in Cybersecurity
Redazione RHC - November 15th, 2025
Critical Vulnerability in FortiWeb: Fortinet and CISA Recommend Urgent Updates
Redazione RHC - November 15th, 2025
China’s New Era of Robots: Shenzhen at the Center of the Technological Revolution
Redazione RHC - November 15th, 2025
IndonesianFoods: The Worm That’s Wreaking Havoc on npm and Created 100,000 Packages
Redazione RHC - November 15th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeOpenAI, the developer of ChatGPT, has announced the search for a new Chief Security Officer . The position, with an annual salary of $555,000, will be directly responsible for mitigating risks associated with artificial intelligence…
CybercrimeDuring the first half of December, a Chinese company assembling devices for Apple was hit by an advanced cyberattack that may have exposed sensitive information related to a production line. The incident was reported by…
CybercrimeThis article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable for its ability to generate…
CybercrimeA new report details a critical vulnerability discovered by security researcher Joseph Goydish in Apple’s WebKit engine. This security flaw, if exploited in conjunction with other exploits, could allow attackers to execute arbitrary code on…
CybercrimeWhen it comes to cybersecurity, it’s easy to fall into the trap of thinking that problems are always far away, that they only affect others. But the reality is that a vulnerability is always around…











