Ultime news
IRS.GOV: alleged data breach affects the accounts of 18 million citizens
Amnesty International Launches .onion Site for Secure Access to Human Rights Info
NANOREMOTE Trojan Uses Google Drive for Command and Control
Microsoft Azure OAuth Attack: ConsentFix Malware Steals Accounts
Linux Foundation Launches Agentic AI Foundation with Key Tech Players
Disney Invests $1 Billion in OpenAI for Sora Video Deal
ATMs targeted! Cybersecurity experts reveal an attack campaign targeting ATMs.
Redazione RHC - November 23rd, 2025
Google Gemini Improves AI-Generated Image Verification
Redazione RHC - November 23rd, 2025
“We Want to Hack You Again!” NSO Group Rejects WhatsApp’s Pegasus Lawsuit
Redazione RHC - November 22nd, 2025
Oracle under attack: Pre-auth RCE vulnerability discovered that compromises entire systems
Redazione RHC - November 22nd, 2025
CrowdStrike Insider Fired for Providing Sensitive Data to Criminal Hackers
Redazione RHC - November 22nd, 2025
Sysmon will finally be integrated into Windows 11 and Windows Server 2025 in 2026
Redazione RHC - November 22nd, 2025
Sneaky2FA: The phishing scam that steals credentials with browser-in-the-browser attacks
Redazione RHC - November 22nd, 2025
TamperedChef: Malware via Fake App Installers
Redazione RHC - November 21st, 2025
Whoever took down Cloudflare during the outage put their infrastructure at risk
Redazione RHC - November 21st, 2025
Critical Vulnerability in Azure Bastion Scores 10! When RDP and SSH in the Cloud Are Checkmated
Redazione RHC - November 21st, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CyberpoliticsItaly has confirmed itself as one of the main targets of the DDoS attack campaign carried out by the hacktivist group NoName057(16) . According to what was declared directly by the collective, our country has…
innovationThe question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry has repeatedly attempted to provide a concrete answer, without ever reaching a definitive solution. From…
CybercrimeThe BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by Picus Security details the group’s…
CybercrimeA study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The study’s results were published by…
CybercrimeA new malware campaign has emerged in the macOS world, one that relies not on sophisticated exploits, but on good old-fashioned social engineering. It’s powered by the MacSync malware, distributed using the ” malware-as-a-service ”…











