Ultime news
Let’s discover injections explained in a simple way
A journey into the world of OT/ICS: What are SCADA servers?
Quishing: What it is, how it works, and how to protect yourself
Password Managers: A Complete Guide to Choosing and Using Them
Discovering the NIS2 Directive: Security and Resilience of Digital Systems in the European Union
Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage
Hikvision Exploiter: The open-source tool for attacking IP cameras
Redazione RHC - October 31st, 2025
100 Infostealer packages uploaded to NPM using AI hallucinations
Redazione RHC - October 30th, 2025
Atroposia: The MaaS platform that provides a Trojan with a vulnerability scanner
Redazione RHC - October 30th, 2025
0day as weapons: sold 8 US defense 0day exploits to Moscow
Redazione RHC - October 30th, 2025
Critical vulnerability in Blink: a website can block all Chromium-based browsers
Redazione RHC - October 30th, 2025
Trump-Xi Summit: A Truce That Doesn’t Benefit Europe
Redazione RHC - October 30th, 2025
Cloud yes or Cloud no: When the Digital Sky Darkens
Redazione RHC - October 30th, 2025
Taiwan: Up to 7 years in prison for those who damage undersea cables
Redazione RHC - October 30th, 2025
95% of companies believe they’re ready for ransomware. But only 15% actually are!
Redazione RHC - October 30th, 2025
Cyber Incident Management in the NIS2 Era
Giancarlo Di Lieto - October 30th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerability in the Linux kernel has caused…

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worrying security flaw in its…











