Ultime news
The Psychology of Passwords: Why Weak Passwords Persist
Russian Cyber Operations Shift to Targeting Western Critical Infrastructure
Google Chrome Security Update Fixes Critical Vulnerabilities
Spiderman Phishing Kit Targets European Banks and Crypto Users
AI Smart Glasses for Police: Efficient Vehicle Checks in China
Notepad++ 8.8.9 Released: Fixing Critical Update Vulnerability
Windows 11 Password Issue: Microsoft Warns of Invisible Icon Bug
Redazione RHC - November 30th, 2025
CISA Warns of OpenPLC ScadaBR Vulnerability Exploitation
Redazione RHC - November 30th, 2025
The Power of A* Algorithm in Artificial Intelligence and Robotics
Redazione RHC - November 30th, 2025
WhatsApp Messages Contain Hidden GPS Data, Expert Warns
Redazione RHC - November 30th, 2025
DeepSeekMath-V2 Revolutionizes Math with AI-Powered Proof Verification
Redazione RHC - November 30th, 2025
Shai-Hulud Attack: npm Supply Chain Compromised Again
Redazione RHC - November 30th, 2025
ChatGPT to Introduce Targeted Ads, Changing Monetization Strategy
Redazione RHC - November 29th, 2025
GitLab Security Updates Fix High-Severity Vulnerabilities CVE-2024-9183
Redazione RHC - November 29th, 2025
Apache SkyWalking Vulnerability Exposes Users to XSS Attacks
Redazione RHC - November 29th, 2025
Bloody Wolf Attacks Central Asia with NetSupport RAT via Java Exploits
Redazione RHC - November 29th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeA study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The study’s results were published by…
CybercrimeA new malware campaign has emerged in the macOS world, one that relies not on sophisticated exploits, but on good old-fashioned social engineering. It’s powered by the MacSync malware, distributed using the ” malware-as-a-service ”…
CybercrimeA sophisticated proxyjacking campaign is targeting systems in South Korea, attributed to the actor Larva-25012 , which distributes proxyware disguised as legitimate Notepad++ installers. The campaign demonstrates significant technical evolution, using process injection in explorer.exe…
CybercrimeFor over a year, the North Korean group PurpleBravo has been running a targeted malware campaign called “Contagious Interview,” using fake job interviews to attack companies in Europe, Asia, the Middle East, and Central America.…
CybercrimeCheck Point Research recently discovered a sophisticated phishing campaign orchestrated by KONNI , a threat group linked to North Korea . Historically focused on diplomatic targets in South Korea, the malicious actor has now expanded…











