Ultime news
Alibaba Qwen3Max Dominates AI Market with Rapid Growth
Digital Surveillance at Work: The Rise of Algorithmic Monitoring
Windows Server Vulnerability Exploited: ShadowPad Malware Deployed
Salesforce Data Breach: ShinyHunters Hack Gainsight Integration
BadAudio Discovered: Ghost Malware Used by APT24 for Three Years Undetected
Satoshi Nakamoto’s Net Worth Drops 34% as Cryptocurrency Crash
Let’s find out what cyber insurance is. It insures your online business, but not only that.
Redazione RHC - November 11th, 2025
Let’s find out what Business Impact Analysis (BIA) is
Redazione RHC - November 11th, 2025
What is risk analysis in ICT Risk Management?
Redazione RHC - November 11th, 2025
What is Web Scraping? Let’s Understand It Better
Redazione RHC - November 11th, 2025
What is a zero-day and the risk of targeted cyber attacks
Redazione RHC - November 11th, 2025
The world of software vulnerabilities: how they’re exploited, who creates them, and how to protect yourself.
Redazione RHC - November 11th, 2025
Exploring Cyberspace: States and Wars Without Geographic Borders
Massimiliano Brolli - November 11th, 2025
Who invented the World Wide Web? The story of Timothy Berners-Lee, the genius behind the web
Redazione RHC - November 11th, 2025
Marketing is nothing! VPNs sell themselves every time a government blocks adult sites
Redazione RHC - November 11th, 2025
Hackers: Who They Are, What They Do, and Their Role in Today’s World
Massimiliano Brolli - November 11th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerability in the Linux kernel has caused…

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worrying security flaw in its…











