Ultime news
Gulf States’ Digital Transformation: A New Era of Innovation and Security
Neurodivergence in Cybersecurity: A Hidden Competitive Advantage
Leroy Merlin Cyberattack Exposes Personal Data of French Customers
Anonymity for Sale: Russian SIM Card Market Thrives Amid Regulations
Hackers Compromise 120k IP Cameras for Pornographic Videos
Microsoft Fixes Old Windows LNK Vulnerability Exploited in Attacks
Two-Factor Authentication and MFA: Protect Your Accounts in 3 Easy Steps!
Redazione RHC - November 14th, 2025
John von Neumann: The Multifaceted Genius of 20th-Century Science
Carlo Denza - November 14th, 2025
The Wayback Machine “of souls” is coming soon. And so are the controversies
Redazione RHC - November 14th, 2025
The AI market is in crisis: NVIDIA and other tech giants are declining.
Redazione RHC - November 14th, 2025
A bug in ImunifyAV antivirus leads to RCE. 56 million sites at risk.
Redazione RHC - November 14th, 2025
Discovering Remote Code Execution (RCE). The most feared security bug!
Manuel Roccon - November 14th, 2025
Google, Amazon, and Meta and Their “Submarine War”
Redazione RHC - November 14th, 2025
TIM and Poste Italiane launch the sovereign cloud: the birth of the Italian-made AI and innovation hub
Redazione RHC - November 14th, 2025
An “autonomous” spy campaign was orchestrated by artificial intelligence
Redazione RHC - November 14th, 2025
A 0-day exploit on FortiWeb WAF is actively exploited! And remove the Admin interfaces from the Internet
Redazione RHC - November 14th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeIn recent months, there has been increasing talk of a paradigm shift in cybercrime . What for years was perceived as a predominantly digital ecosystem— consisting of fraud, identity theft, online extortion, and cyberattacks —is…
CybercrimeSometimes important things don’t arrive at a press conference. They arrive like a graph that stops breathing: the connectivity line collapses, the OSINT dries up, the noise grows as the signal disappears. In Iran, the…
A critical flaw has been identified in ServiceNow’s artificial intelligence platform, with a severity score of 9.3 out of 10. This vulnerability, classified as CVE-2025-12420, could allow attackers to impersonate legitimate users without authenticating. ServiceNow…
CybercrimeInfluenza remains one of the most stubborn and unpleasant infections on the planet. It returns every winter, mutating, evading the immune system, and eventually becoming drug-resistant. Now, scientists are proposing an unexpected approach that could…
CybercrimeImagine a situation where the internet appears to be working, but websites won’t open beyond the first screen, messaging apps are intermittent, and businesses are constantly changing. According to the authors of a recent annual…











