Ultime news
Nvidia H200 Chip Shipments to China Set to Begin
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Spotify Web Scraping: Anna’s Archive Scrapes 300TB of Music Library
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Ukrainian Hacker Charged in Major Ransomware Attacks
The Rise of Digital Walls: How National Sovereignty Threatens Global Internet
Airbus Eyes Sovereign Cloud to Mitigate US Data Risks
Redazione RHC - December 21st, 2025
North Korean Hackers Steal $2 Billion in Crypto, Targeting DeFi Sector
Redazione RHC - December 21st, 2025
Kimwolf Botnet: The Rising Threat of DDoS Attacks on IoT Devices
Redazione RHC - December 20th, 2025
54 Arrested in $Multi-Million ATM Jackpotting Scheme Linked to Tren de Aragua
Redazione RHC - December 20th, 2025
The Birth of World Wide Web: How Tim Berners-Lee Created the First Website
Redazione RHC - December 20th, 2025
WatchGuard Firewall Zero-Day Vulnerability CVE-2025-14733 Exploited
Redazione RHC - December 19th, 2025
Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk
Redazione RHC - December 19th, 2025
Google and Apple Embrace Interoperability with Android iOS Data Transfer
Redazione RHC - December 19th, 2025
Ink Dragon Targets Europe: Exploiting SharePoint and IIS Vulnerabilities
Sandro Sana - December 19th, 2025
Bypassing AI Safety: EchoGram Exposes Vulnerabilities in LLM Defenses
Redazione RHC - December 19th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeOpenAI, the developer of ChatGPT, has announced the search for a new Chief Security Officer . The position, with an annual salary of $555,000, will be directly responsible for mitigating risks associated with artificial intelligence…
CybercrimeDuring the first half of December, a Chinese company assembling devices for Apple was hit by an advanced cyberattack that may have exposed sensitive information related to a production line. The incident was reported by…
CybercrimeThis article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable for its ability to generate…
CybercrimeA new report details a critical vulnerability discovered by security researcher Joseph Goydish in Apple’s WebKit engine. This security flaw, if exploited in conjunction with other exploits, could allow attackers to execute arbitrary code on…
CybercrimeWhen it comes to cybersecurity, it’s easy to fall into the trap of thinking that problems are always far away, that they only affect others. But the reality is that a vulnerability is always around…











