Ultime news
GDPR Data Breach: Email Errors and Consequences
Ettore Accenti: The Italian Tech Pioneer Who Brought Intel to Italy
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Anthropic Releases Claude Opus 4.5: AI Model for Enhanced Productivity
Alibaba Qwen3Max Dominates AI Market with Rapid Growth
Digital Surveillance at Work: The Rise of Algorithmic Monitoring
Vault7 with a Chinese twist: China’s secret global surveillance system exposed
Redazione RHC - November 10th, 2025
Whisper Leak: The New Side-Channel Attack That Steals Messages with LLMs
Redazione RHC - November 10th, 2025
QNAP fixes 7 critical NAS bugs discovered at Pwn2Own Ireland 2025
Redazione RHC - November 10th, 2025
Artificial intelligence surpasses humans, but not in every field. Is AGI near or far away?
Redazione RHC - November 10th, 2025
Techno-optimism vs. the power of control: are we the greatest threat from AI?
Olivia Terragni - November 9th, 2025
Google Gemini 3.0: New features and updates for the year’s most anticipated AI assistant
Redazione RHC - November 9th, 2025
Domestic robots and privacy: the hidden price of the automated future
Luca Galuppi - November 9th, 2025
The tale of the Mayor who thought of banning axes… but then came the Saws
Stefano Gazzella - November 9th, 2025
WhatsApp used to spread LANDFALL, the new spyware for Android Samsung
Redazione RHC - November 9th, 2025
Trump and Kim Jong Un summit? There seems to be a high probability of a meeting.
Redazione RHC - November 9th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeThis article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable for its ability to generate…
CybercrimeA new report details a critical vulnerability discovered by security researcher Joseph Goydish in Apple’s WebKit engine. This security flaw, if exploited in conjunction with other exploits, could allow attackers to execute arbitrary code on…
CybercrimeWhen it comes to cybersecurity, it’s easy to fall into the trap of thinking that problems are always far away, that they only affect others. But the reality is that a vulnerability is always around…
CybercrimeFraudulent job ads promising easy money and remote work continue to flood social media, particularly in the Middle East and North Africa . Under the guise of part-time jobs that require no experience , scammers…
CybercrimeThe cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…











