Ultime news
Python to Rust: A More Secure Future for the Programming Language
Multi-threaded Hacking: US Pioneers Automated Operations with AI Agents
WhatsApp data leak: 3.5 billion numbers “stolen” by researchers at the University of Vienna
Google launches Gemini 3, its most advanced artificial intelligence model
CISA’s ‘Secure by Design’ Pledge: A Year of Progress in Cybersecurity
Cloudflare global outage: It was an internal technical error. Let’s find out the cause.
Hanyuan-1: China’s room-temperature quantum computer challenges the US
Redazione RHC - November 3rd, 2025
Inside NVIDIA: Jensen Huang leads 36 managers, 36,000 employees, and reads 20,000 emails a day
Redazione RHC - November 3rd, 2025
Userbox shut down and its admin arrested by Moscow police. Something is changing.
Redazione RHC - November 3rd, 2025
Will Bug Hunters Be Out of Work? OpenAI Introduces Aardvark, Its New Bug Fixer
Redazione RHC - November 3rd, 2025
The Louvre Theft: How Password Governance Can Undermine Security
Redazione RHC - November 3rd, 2025
Xi Jinping proposes a global organization for artificial intelligence
Redazione RHC - November 3rd, 2025
The Future of Society in the Age of Artificial Intelligence
Ugo Micci - November 3rd, 2025
When Google Indexes Even Deception! Ghost Networks Discovered by RHC That Penalize SERPs
Redazione RHC - November 3rd, 2025
Alleged EY Data Leak: 4TB of SQL Backups Exposed on Azure Cloud
Luca Stivali - November 3rd, 2025
Theft at the Louvre: The surveillance system’s password “LOUVRE” has put the museum in crisis.
Redazione RHC - November 2nd, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeThe cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…
CybercrimeStraiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…











