Ultime news
SAP Security Update Fixes Critical Code Injection Vulnerability in Solution Manager
Passwordless Authentication: The Future of Secure Online Access
Critical PromptPwnd Vulnerability Exposes AI-Powered GitLab, GitHub Pipelines
LLM-Powered Malware: The Future of Autonomous Cyber Threats
Intellexa Exploits Zero-Day Vulnerabilities with Spyware
Malaysia Cracks Down on Bitcoin Mining Thefts
Apple ordered to pay $634 million to Masimo for patent infringement
Redazione RHC - November 18th, 2025
Microsoft Azure blocks a 15.72 terabit per second DDoS attack
Redazione RHC - November 18th, 2025
Real World and Fictional World: A Psychological and Philosophical Analysis of the 1999 Film The Matrix by Lana and Lilly Wachowski
Daniela Farina - November 17th, 2025
The phenomenon of polarization on the internet: Hikikomori
Daniela Farina - November 17th, 2025
From Likes to Depression: How Social Media Can Affect Our Mental Health
Daniela Farina - November 17th, 2025
The US and Global Surveillance: Uncovering Section 702 of the Foreign Intelligence Surveillance Act
Aniello Giugliano - November 17th, 2025
What is Cross-Site Scripting? An article to help you understand it in a simple way.
Davide Cavallini - November 17th, 2025
Spy Apps: How Spyware Works and Why It’s a Privacy Risk
Redazione RHC - November 17th, 2025
Asus releases emergency firmware update for vulnerable DSL routers.
Redazione RHC - November 17th, 2025
Nuclear power entirely in the hands of AI! And what if there’s an accident?
Redazione RHC - November 17th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeElon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…
CultureMandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…
CybercrimeNo worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…
CybercrimeAfter a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…











