Ultime news
Microsoft Blocks KMS38 Activation Method for Windows 10 and 11
Future prospects for computer science and technology graduates
ATMs targeted! Cybersecurity experts reveal an attack campaign targeting ATMs.
Google Gemini Improves AI-Generated Image Verification
“We Want to Hack You Again!” NSO Group Rejects WhatsApp’s Pegasus Lawsuit
Oracle under attack: Pre-auth RCE vulnerability discovered that compromises entire systems
2 critical bugs detected on Cisco Unified Contact Center Express (CCX)
Redazione RHC - November 7th, 2025
China is using artificial intelligence to improve mass surveillance
Redazione RHC - November 6th, 2025
Microsoft apologizes to 3 million Australian users for unfair business practices
Redazione RHC - November 6th, 2025
Cisco Addresses Critical Vulnerabilities in ASA and Unified Contact Center Express
Redazione RHC - November 6th, 2025
Rust Rebels! Fund Launched to Pay Open Source Maintainers
Redazione RHC - November 6th, 2025
12.5 million HD movies per second! Amazon’s undersea cable will connect the US to Ireland.
Redazione RHC - November 6th, 2025
SMTP Posts Actively Exploited: 400,000 WordPress Sites at Risk
Redazione RHC - November 6th, 2025
They told you 6G would be fast, right? But they didn’t tell you the whole truth
Sandro Sana - November 6th, 2025
Cyberattacks against public applications are increasing. Cisco’s report
Redazione RHC - November 6th, 2025
Epic vs. Google: Historic Agreement for App Developers
Redazione RHC - November 6th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeOpenAI, the developer of ChatGPT, has announced the search for a new Chief Security Officer . The position, with an annual salary of $555,000, will be directly responsible for mitigating risks associated with artificial intelligence…
CybercrimeDuring the first half of December, a Chinese company assembling devices for Apple was hit by an advanced cyberattack that may have exposed sensitive information related to a production line. The incident was reported by…
CybercrimeThis article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable for its ability to generate…
CybercrimeA new report details a critical vulnerability discovered by security researcher Joseph Goydish in Apple’s WebKit engine. This security flaw, if exploited in conjunction with other exploits, could allow attackers to execute arbitrary code on…
CybercrimeWhen it comes to cybersecurity, it’s easy to fall into the trap of thinking that problems are always far away, that they only affect others. But the reality is that a vulnerability is always around…











