Ultime news
ADC Aerospace Hit by Play Ransomware Attack, Data Breach Feared
Microsoft 365 Security Risk: Interface Poisoning Attacks
Calendar Subscriptions: A Hidden Danger in Your Digital Life
Airbus A320 Recall Due to ELAC System Failure Caused by Solar Flares
OpenAI Faces Fierce Competition from Google’s Gemini 3
Leonardo’s Michelangelo Dome: AI-Powered Defense Against Hypersonic Threats
The AI market is in crisis: NVIDIA and other tech giants are declining.
Redazione RHC - November 14th, 2025
A bug in ImunifyAV antivirus leads to RCE. 56 million sites at risk.
Redazione RHC - November 14th, 2025
Discovering Remote Code Execution (RCE). The most feared security bug!
Manuel Roccon - November 14th, 2025
Google, Amazon, and Meta and Their “Submarine War”
Redazione RHC - November 14th, 2025
TIM and Poste Italiane launch the sovereign cloud: the birth of the Italian-made AI and innovation hub
Redazione RHC - November 14th, 2025
An “autonomous” spy campaign was orchestrated by artificial intelligence
Redazione RHC - November 14th, 2025
A 0-day exploit on FortiWeb WAF is actively exploited! And remove the Admin interfaces from the Internet
Redazione RHC - November 14th, 2025
VLC and its creator receive award for choosing freedom over millions of dollars
Redazione RHC - November 13th, 2025
What is Misevolution: The Autonomous Evolution of AI Agents, and It’s Not Always Good
Redazione RHC - November 13th, 2025
Tanks are no longer needed: new wars are fought from a laptop
Roberto Villani - November 13th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeThis article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable for its ability to generate…
CybercrimeA new report details a critical vulnerability discovered by security researcher Joseph Goydish in Apple’s WebKit engine. This security flaw, if exploited in conjunction with other exploits, could allow attackers to execute arbitrary code on…
CybercrimeWhen it comes to cybersecurity, it’s easy to fall into the trap of thinking that problems are always far away, that they only affect others. But the reality is that a vulnerability is always around…
CybercrimeFraudulent job ads promising easy money and remote work continue to flood social media, particularly in the Middle East and North Africa . Under the guise of part-time jobs that require no experience , scammers…
CybercrimeThe cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…











