Ultime news
North Korean hackers steal $2 billion in cryptocurrency in nine months of fraud
Scattered Lapsus$ Hunters: “We’re paying those who bombard corporate executives with emails.”
Redox OS introduces multithreading by default and improves performance.
Feed Wars: Pro-Israel PsyOps Land on TikTok and ChatGPT
Do you have Teams? You’re a Target! The Microsoft Platform is Targeted by States and Criminals
Google CodeMender is here! When AI finds bugs in code and fixes them itself.
When a VPN Becomes a Spy! FreeVPN.One Takes Unauthorized Screenshots
Redazione RHC - August 23rd, 2025
RapperBot DDoS botnet dismantled and alleged developer arrested
Redazione RHC - August 23rd, 2025
The “My Wife” case and the challenges of digital responsibility: privacy, revenge porn, and the role of platforms
Paolo Galdieri - August 23rd, 2025
Google’s 2025 Performance Review: Fewer Bugs, More Vibe Coding
Redazione RHC - August 23rd, 2025
$20 million in zero-day exploits from broker Advanced Security Solutions
Redazione RHC - August 22nd, 2025
Will 2029 be the year of Q-Day? But what if the SHA1 replacement took 12 years?
Redazione RHC - August 22nd, 2025
Critical Downgrade Bug in Chat-GPT Leads to Jailbreak of Model
Redazione RHC - August 22nd, 2025
China’s Great Firewall blocks internet traffic for 74 minutes
Redazione RHC - August 22nd, 2025
A Criminal Hacker Sells Access to Roche Underground Servers
Redazione RHC - August 22nd, 2025
972 million Google Play VPN users are at risk!
Redazione RHC - August 22nd, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…

In the past, many users and system administrators have relied on Microsoft’s telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation Key) licenses were widely available.…

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…











