Ultime news
The Future of Tech: Sovereignty, Security, and Cloud Control
Internet Shutdowns Cost $19.7B in 2025, Sophisticated Censorship Rises
Doom on a Smart Pressure Cooker: The Ultimate IoT Hack
LockBit 5.0 Ransomware: The Evolving Threat
Instagram Data Leak Exposes 17.5 Million Users on Dark Web
Phishing Emails Mimic Internal Comms via Microsoft 365 Spoofing
Microsoft’s AI Future: Models to Systems with Satya Nadella
Redazione RHC - January 6th, 2026
Rare Earth Elements: US-China Competition Heats Up
Redazione RHC - January 6th, 2026
Patchwork Group Unleashes StreamSpy Malware with WebSocket C2 Channel
Redazione RHC - January 6th, 2026
WhatsApp Device Fingerprinting: New Measures Against Privacy Threats
Redazione RHC - January 6th, 2026
Microsoft Removes Phone Activation for Windows and Office
Redazione RHC - January 6th, 2026
PS5 BootROM Key Leaked, Sony’s Security Compromised
Redazione RHC - January 5th, 2026
China Achieves Quantum Error Correction Breakthrough with Microchip
Redazione RHC - January 5th, 2026
Critical GNU Wget2 Vulnerability Exposes Users to File Overwrite Attacks
Redazione RHC - January 5th, 2026
Windows 11 Performance Test: Surprising Results with Windows 8.1
Redazione RHC - January 5th, 2026
PentestAgent: Revolutionizing Penetration Testing with AI-Powered Tools
Redazione RHC - January 5th, 2026
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CultureMandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…
CybercrimeNo worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…
CybercrimeAfter a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…
CybercrimeCheck Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…











