Ultime news
CrowdStrike Insider Fired for Providing Sensitive Data to Criminal Hackers
Sysmon will finally be integrated into Windows 11 and Windows Server 2025 in 2026
Sneaky2FA: The phishing scam that steals credentials with browser-in-the-browser attacks
TamperedChef: Malware via Fake App Installers
Whoever took down Cloudflare during the outage put their infrastructure at risk
Critical Vulnerability in Azure Bastion Scores 10! When RDP and SSH in the Cloud Are Checkmated
Undersea Cables, the New Hybrid War: Jaroslav Nad’s Alarm
Redazione RHC - November 6th, 2025
Apache OpenOffice under ransomware attack, but the foundation disputes
Redazione RHC - November 6th, 2025
Microsoft Exchange Server Penetration Testing: Techniques, Tools, and Countermeasures
Alessandro Molinari - November 6th, 2025
Notepad++ under attack! How a fake DLL opens the door to criminal hackers
Manuel Roccon - November 6th, 2025
Microsoft warns: Security updates cause problems with BitLocker
Redazione RHC - November 5th, 2025
A dangerous zero-day zero-click exploit threatens billions of Android devices
Redazione RHC - November 5th, 2025
Is the era of paywalls over? Smart browsers circumvent them, and controlling them is very difficult
Redazione RHC - November 5th, 2025
Danger for OneDrive users: Infected DLLs hide in shared files
Redazione RHC - November 5th, 2025
ArXiv blocks articles generated by AI
Redazione RHC - November 5th, 2025
CISA Warns! New Bugs in Gladinet, Control Web Panel, and WordPress Expose Systems
Redazione RHC - November 5th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeOpenAI, the developer of ChatGPT, has announced the search for a new Chief Security Officer . The position, with an annual salary of $555,000, will be directly responsible for mitigating risks associated with artificial intelligence…
CybercrimeDuring the first half of December, a Chinese company assembling devices for Apple was hit by an advanced cyberattack that may have exposed sensitive information related to a production line. The incident was reported by…
CybercrimeThis article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable for its ability to generate…
CybercrimeA new report details a critical vulnerability discovered by security researcher Joseph Goydish in Apple’s WebKit engine. This security flaw, if exploited in conjunction with other exploits, could allow attackers to execute arbitrary code on…
CybercrimeWhen it comes to cybersecurity, it’s easy to fall into the trap of thinking that problems are always far away, that they only affect others. But the reality is that a vulnerability is always around…











