Ultime news
Microsoft 365 Outage: Thousands of Users Affected Worldwide
Is your VPN protecting you or spying on you? 800 free VPNs analyzed with disturbing results.
Windows 11 now forces you to connect: is offline freedom over?
Man with amyotrophic lateral sclerosis controls robotic arm with Neuralink
Wave of attacks against Palo Alto Networks: Over 2,200 IPs involved in the new campaign
Qualcomm Acquires Arduino to Strengthen Presence in IoT and Robotics
200 car models vulnerable? ‘Killer’ firmware for Flipper Zero surfaces on the darknet.
Redazione RHC - August 25th, 2025
“Son, get access to your dad’s smartphone!” Sharp increase in fraud involving minors
Redazione RHC - August 25th, 2025
Windows 11 Insider Preview: New features and improvements ahead
Redazione RHC - August 25th, 2025
PoC Zero-Click Exploit on iPhone and Mac: How Two Bytes Can Compromise the Apple Ecosystem
Redazione RHC - August 25th, 2025
Your kidneys for sale on the dark web! The DaVita ransomware attack affects 2.4 million patients
Redazione RHC - August 24th, 2025
ChatGPT, will it be your new life companion? Humans are saying goodnight to AI
Redazione RHC - August 24th, 2025
DeepSeek launches version 3.1 of its AI model with support for Chinese chips
Redazione RHC - August 24th, 2025
Microsoft is investigating an Exchange Online outage affecting the Outlook mobile app
Redazione RHC - August 24th, 2025
Can a file name compromise a Linux system? Chinese hackers say so
Redazione RHC - August 24th, 2025
Beware of dissatisfied employees! Four years in prison for bringing his former company to its knees.
Redazione RHC - August 23rd, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…

In the past, many users and system administrators have relied on Microsoft’s telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation Key) licenses were widely available.…

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…











