Ultime news
NANOREMOTE Trojan Uses Google Drive for Command and Control
Microsoft Azure OAuth Attack: ConsentFix Malware Steals Accounts
Linux Foundation Launches Agentic AI Foundation with Key Tech Players
Disney Invests $1 Billion in OpenAI for Sora Video Deal
Microsoft 365 Okta Phishing Attack: Experts Warn of New Threat
React Server Components Vulnerability: Update to Prevent DoS Attacks
CISA Warns of Spyware Attacks on Mobile Messaging Apps
Redazione RHC - November 25th, 2025
New ClickFix Malware Campaign Targets Windows Users with Fake Updates
Redazione RHC - November 25th, 2025
GDPR Data Breach: Email Errors and Consequences
Stefano Gazzella - November 25th, 2025
Ettore Accenti: The Italian Tech Pioneer Who Brought Intel to Italy
Carlo Denza - November 25th, 2025
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Redazione RHC - November 25th, 2025
Anthropic Releases Claude Opus 4.5: AI Model for Enhanced Productivity
Redazione RHC - November 24th, 2025
Alibaba Qwen3Max Dominates AI Market with Rapid Growth
Redazione RHC - November 24th, 2025
Digital Surveillance at Work: The Rise of Algorithmic Monitoring
Redazione RHC - November 24th, 2025
Windows Server Vulnerability Exploited: ShadowPad Malware Deployed
Redazione RHC - November 24th, 2025
Salesforce Data Breach: ShinyHunters Hack Gainsight Integration
Redazione RHC - November 24th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeResearchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…
CybercrimeElon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…
CultureMandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…
CybercrimeNo worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…











