Ultime news
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
CEO Scam: How to Protect Your Company from Business Email Compromise
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
11.7% of jobs could be replaced by artificial intelligence
The market for “controlling” people is taking off on the Dark Web.
God is in the Cloud: They Hacked Your Brain and You Liked It
Malware is a ticking time bomb! The threat to Siemens S7 PLCs begins in 2027.
Redazione RHC - November 10th, 2025
The Illicit Distribution of Intimate Images: A Threat to Women’s Freedom
Paolo Galdieri - November 10th, 2025
Vault7 with a Chinese twist: China’s secret global surveillance system exposed
Redazione RHC - November 10th, 2025
Whisper Leak: The New Side-Channel Attack That Steals Messages with LLMs
Redazione RHC - November 10th, 2025
QNAP fixes 7 critical NAS bugs discovered at Pwn2Own Ireland 2025
Redazione RHC - November 10th, 2025
Artificial intelligence surpasses humans, but not in every field. Is AGI near or far away?
Redazione RHC - November 10th, 2025
Techno-optimism vs. the power of control: are we the greatest threat from AI?
Olivia Terragni - November 9th, 2025
Google Gemini 3.0: New features and updates for the year’s most anticipated AI assistant
Redazione RHC - November 9th, 2025
Domestic robots and privacy: the hidden price of the automated future
Luca Galuppi - November 9th, 2025
The tale of the Mayor who thought of banning axes… but then came the Saws
Stefano Gazzella - November 9th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeA flaw has been discovered in the foundation of the Java web ecosystem. Undertow , the high-performance web server that powers enterprise heavyweights like WildFly and JBoss EAP , has been hit by a critical…
CybercrimeIranian protesters chanted and marched through the streets until Friday morning, following a call from exiled former Prince Reza Pahlavi to demonstrate, despite the Iranian theocracy cutting off the country from the internet and international…
CybercrimeBackups are generally considered the last line of defense, but this week Veeam reminded us that backup systems themselves can become entry points for attacks. The company released security updates for Backup & Replication ,…
CybercrimeFor much of the past two decades, cybersecurity has been built on a simple assumption: malicious activity can be detected, analysed, and responded to before meaningful damage occurs. This assumption shaped everything from SOC design…
CybercrimeThe vulnerability, identified as CVE-2026-21858, which we recently reported on, affects approximately 100,000 servers worldwide, threatening to expose proprietary API keys, customer databases, and AI workflows. The vulnerability, with a CVSS score of 10, has…











