Ultime news
GhostFrame Phishing Kit: New Stealthy PhaaS Threat Emerges
WhatsApp: all it takes is a phone number to know when you sleep, go out, or come home
Cyber Geopolitics: How Tech Becomes a Global Battleground
SOAP Vulnerability in .NET Framework Allows Remote Code Execution
CVE-2025-55182 React Server Components Vulnerability Exploited
Top 25 Software Vulnerabilities 2025: MITRE CWE Ranking and Security Tips
Bloody Wolf Attacks Central Asia with NetSupport RAT via Java Exploits
Redazione RHC - November 29th, 2025
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
Redazione RHC - November 28th, 2025
CEO Scam: How to Protect Your Company from Business Email Compromise
Redazione RHC - November 28th, 2025
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Redazione RHC - November 28th, 2025
11.7% of jobs could be replaced by artificial intelligence
Redazione RHC - November 28th, 2025
The market for “controlling” people is taking off on the Dark Web.
Redazione RHC - November 28th, 2025
God is in the Cloud: They Hacked Your Brain and You Liked It
Fabrizio Saviano - November 28th, 2025
Does Windows Suck? A Video by Dave Plummer, the Microsoft Engineer Who Created Task Manager
Redazione RHC - November 28th, 2025
China surpasses US in open-source AI models
Redazione RHC - November 28th, 2025
ENISA takes on the role of Root in the European Cybersecurity Initiative (CVE).
Redazione RHC - November 27th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…
CybercrimeAfter a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…
CybercrimeCheck Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…
CybercrimeA recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…
CybercrimeOn January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…











