Ultime news
Microsoft Defender incorrectly flags SQL Server 2019 as End of Life
The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
Intel and NVIDIA: From Historic Rivals to Partners in the New Artificial Intelligence Market
7-Zip Vulnerable: Symbolic Link Exploit Allows Malicious Code Injection
Salesforce refuses to pay ransom for Scattered Lapsus Hunters attacks
40,000 iPhones stolen and shipped to Asia: London police arrest international gang
Vibe Coding: Revolution or Security Risk?
Redazione RHC - August 28th, 2025
Critical vulnerabilities in NetScaler ADC and Gateway. Update now! Attacks are ongoing!
Redazione RHC - August 28th, 2025
The Democratization of Cybercrime Has Arrived! “I Can’t Code, But I Write Ransomware”
Redazione RHC - August 28th, 2025
FreePBX under attack: Zero-day exploit already in use, emergency patch released
Luca Galuppi - August 28th, 2025
Storm-0501: When Ransomware Moves to the Cloud
Luca Galuppi - August 28th, 2025
Microsoft Teams crashes: Embedded Office documents blocked from opening
Luca Galuppi - August 28th, 2025
ChatGPT “Taught My Son How to Die”! Adam Reid’s Parents Sue OpenAI
Redazione RHC - August 28th, 2025
By 2026, no more “ghost” apps: Android will only accept verified developers.
Redazione RHC - August 27th, 2025
Devastating Cyber Attack Paralyzes Nevada Government Network
Redazione RHC - August 27th, 2025
Auchan data leak: hundreds of thousands of customers affected by a hacker attack
Redazione RHC - August 27th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerability in the Linux kernel has caused…

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worrying security flaw in its…











