Ultime news
How Profanity Varies Across Social Media and Cultures
GhostFrame Phishing Kit: New Stealthy PhaaS Threat Emerges
WhatsApp: all it takes is a phone number to know when you sleep, go out, or come home
Cyber Geopolitics: How Tech Becomes a Global Battleground
SOAP Vulnerability in .NET Framework Allows Remote Code Execution
CVE-2025-55182 React Server Components Vulnerability Exploited
Alibaba Qwen3Max Dominates AI Market with Rapid Growth
Redazione RHC - November 24th, 2025
Digital Surveillance at Work: The Rise of Algorithmic Monitoring
Stefano Gazzella - November 24th, 2025
Windows Server Vulnerability Exploited: ShadowPad Malware Deployed
Agostino Pellegrino - November 24th, 2025
Salesforce Data Breach: ShinyHunters Hack Gainsight Integration
Redazione RHC - November 24th, 2025
BadAudio Discovered: Ghost Malware Used by APT24 for Three Years Undetected
Agostino Pellegrino - November 24th, 2025
Satoshi Nakamoto’s Net Worth Drops 34% as Cryptocurrency Crash
Redazione RHC - November 24th, 2025
Cyberattack on Eurofiber France: Find out what happened
Stefano Gazzella - November 24th, 2025
From Risk to Resilience: How Veeam Protects Your Supply Chain from Disruptions
Redazione RHC - November 24th, 2025
When the Cloud Falls: How a Small Mistake Brought the Global Internet to Its Knees
Gaia Russo - November 24th, 2025
Father and son break world speed record with homemade drone
Redazione RHC - November 23rd, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeA recent leak revealed 149 million logins and passwords exposed online , including accounts for financial services, social media, gaming, and dating sites. The discovery was made by researcher Jeremiah Fowler and shared with ExpressVPN.…
CybercrimePixelCode began as a research project exploring a hidden technique for storing binary data within images or videos . Instead of leaving a plaintext executable, the file is converted into pixel data, transforming each byte…
Cyber NewsSecurity researchers have recently observed a worrying evolution in the offensive tactics attributed to North Korean-linked actors as part of the campaign known as Contagious Interview : no longer simple fake job interview scams, but…
Cyber NewsKhaby Lame, the world’s most followed Italian creator and now a global social media icon, has taken a step that could mark a turning point in the history of the digital economy. According to several…
Cyber NewsThe critical vulnerability recently added to the Cybersecurity and Infrastructure Security Agency (CISA) catalog of known exploited vulnerabilities (KEVs) affects the Broadcom VMware vCenter Server and is being actively exploited by malicious hackers to breach…












