Ultime news
Amnesty International Launches .onion Site for Secure Access to Human Rights Info
NANOREMOTE Trojan Uses Google Drive for Command and Control
Microsoft Azure OAuth Attack: ConsentFix Malware Steals Accounts
Linux Foundation Launches Agentic AI Foundation with Key Tech Players
Disney Invests $1 Billion in OpenAI for Sora Video Deal
Microsoft 365 Okta Phishing Attack: Experts Warn of New Threat
US States Crack Down on VPNs and Online Privacy for Minors
Redazione RHC - November 26th, 2025
Logitech Hit by Clop Ransomware Attack, Data Breach Exposed
Redazione RHC - November 26th, 2025
Malware Uses Finger Command to Infect Windows Devices
Redazione RHC - November 26th, 2025
The Future of Tech: How to Navigate the Digital World
Redazione RHC - November 26th, 2025
Google Gemini 3.0 Shakes Nvidia’s AI Dominance with TPU Innovation
Redazione RHC - November 25th, 2025
CISA Warns of Spyware Attacks on Mobile Messaging Apps
Redazione RHC - November 25th, 2025
New ClickFix Malware Campaign Targets Windows Users with Fake Updates
Redazione RHC - November 25th, 2025
GDPR Data Breach: Email Errors and Consequences
Stefano Gazzella - November 25th, 2025
Ettore Accenti: The Italian Tech Pioneer Who Brought Intel to Italy
Carlo Denza - November 25th, 2025
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Redazione RHC - November 25th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…
CybercrimeAfter a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…
CybercrimeCheck Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…
CybercrimeA recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…
CybercrimeOn January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…











