Ultime news
VPN Credentials on the Dark Web: A Growing Cybersecurity Threat
Uncovering Russia’s Cyber Operations: CISM’s Role in DDoS Attacks
Microsoft Outlook RCE Vulnerability: Update Now to Prevent Attacks
Google Chrome Urgent Update Fixes Zero-Day Vulnerability
EtherRAT Malware Exploits React2Shell Vulnerability with Ethereum C2
Is QDay approaching? QuantWare presents its 10,000-qubit quantum processor
World Children’s Day: Children live in digital, but digital wasn’t designed for them.
Simone D'Agostino - November 20th, 2025
Huawei unveils HarmonyOS and the new HM740 laptop. Is Microsoft Office at risk?
Redazione RHC - November 20th, 2025
Meta and Google suspend construction of two undersea cables due to instability in the Red Sea
Redazione RHC - November 20th, 2025
Let the hunt begin! Critical 7-Zip bug puts millions of users at risk.
Redazione RHC - November 20th, 2025
Python to Rust: A More Secure Future for the Programming Language
Redazione RHC - November 19th, 2025
Multi-threaded Hacking: US Pioneers Automated Operations with AI Agents
Redazione RHC - November 19th, 2025
WhatsApp data leak: 3.5 billion numbers “stolen” by researchers at the University of Vienna
Redazione RHC - November 19th, 2025
Google launches Gemini 3, its most advanced artificial intelligence model
Redazione RHC - November 19th, 2025
CISA’s ‘Secure by Design’ Pledge: A Year of Progress in Cybersecurity
Redazione RHC - November 19th, 2025
Cloudflare global outage: It was an internal technical error. Let’s find out the cause.
Redazione RHC - November 19th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeA study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The study’s results were published by…
CybercrimeA new malware campaign has emerged in the macOS world, one that relies not on sophisticated exploits, but on good old-fashioned social engineering. It’s powered by the MacSync malware, distributed using the ” malware-as-a-service ”…
CybercrimeA sophisticated proxyjacking campaign is targeting systems in South Korea, attributed to the actor Larva-25012 , which distributes proxyware disguised as legitimate Notepad++ installers. The campaign demonstrates significant technical evolution, using process injection in explorer.exe…
CybercrimeFor over a year, the North Korean group PurpleBravo has been running a targeted malware campaign called “Contagious Interview,” using fake job interviews to attack companies in Europe, Asia, the Middle East, and Central America.…
CybercrimeCheck Point Research recently discovered a sophisticated phishing campaign orchestrated by KONNI , a threat group linked to North Korea . Historically focused on diplomatic targets in South Korea, the malicious actor has now expanded…











