Ultime news
AI Browser Attack: Google Drive Wiper Threat Exposed
NATO Cyber Coalition Exercise: Enhancing Cyber Defense with 1,300 Experts
Microsoft 365 Price Hike: What You Need to Know About the 2026 Increase
React2Shell Vulnerability Exploited by China-Linked Hackers, Patch Now
FreeBSD 15.0: Discover the Power of This Unix-like Operating System
Cloudflare Blocks AI Bots: The Future of Internet Economy at Stake
Vibe-Hacking: The New Frontier of Criminal Cybersecurity
Andrea Fellegara - November 15th, 2025
Two-Factor Authentication and MFA: Protect Your Accounts in 3 Easy Steps!
Redazione RHC - November 14th, 2025
John von Neumann: The Multifaceted Genius of 20th-Century Science
Carlo Denza - November 14th, 2025
The Wayback Machine “of souls” is coming soon. And so are the controversies
Redazione RHC - November 14th, 2025
The AI market is in crisis: NVIDIA and other tech giants are declining.
Redazione RHC - November 14th, 2025
A bug in ImunifyAV antivirus leads to RCE. 56 million sites at risk.
Redazione RHC - November 14th, 2025
Discovering Remote Code Execution (RCE). The most feared security bug!
Manuel Roccon - November 14th, 2025
Google, Amazon, and Meta and Their “Submarine War”
Redazione RHC - November 14th, 2025
TIM and Poste Italiane launch the sovereign cloud: the birth of the Italian-made AI and innovation hub
Redazione RHC - November 14th, 2025
An “autonomous” spy campaign was orchestrated by artificial intelligence
Redazione RHC - November 14th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeA group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…
CybercrimeResearchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…
CybercrimeElon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…
CultureMandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…
CybercrimeNo worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…











