Ultime news
Cloudflare Just Broke the Internet… Again. Centralization Risks Exposed
Chinese Cyber Spies Use Brickstorm Malware to Infiltrate Critical Networks
Splunk Enterprise Vulnerability: CVE-2025-20386 and CVE-2025-20387
Apache HTTP Server Update Fixes Critical Security Vulnerabilities
Cyber Insurance: Why Basic Hygiene Matters
Meta AI WhatsApp Investigation
Google, Amazon, and Meta and Their “Submarine War”
Redazione RHC - November 14th, 2025
TIM and Poste Italiane launch the sovereign cloud: the birth of the Italian-made AI and innovation hub
Redazione RHC - November 14th, 2025
An “autonomous” spy campaign was orchestrated by artificial intelligence
Redazione RHC - November 14th, 2025
A 0-day exploit on FortiWeb WAF is actively exploited! And remove the Admin interfaces from the Internet
Redazione RHC - November 14th, 2025
VLC and its creator receive award for choosing freedom over millions of dollars
Redazione RHC - November 13th, 2025
What is Misevolution: The Autonomous Evolution of AI Agents, and It’s Not Always Good
Redazione RHC - November 13th, 2025
Tanks are no longer needed: new wars are fought from a laptop
Roberto Villani - November 13th, 2025
A 0Day bug for a WordPress plugin sold for 6000 euros in the underground
Redazione RHC - November 13th, 2025
Can a cyber attack reduce a country’s GDP? In the UK, it seems so!
Redazione RHC - November 13th, 2025
Triofox Antivirus Exploited to Install Remote Access Components
Redazione RHC - November 13th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…
CybercrimeAfter a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…
CybercrimeCheck Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…
CybercrimeA recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…
CybercrimeOn January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…











