Ultime news
A single data center on fire, an entire country in digital blackout: the case of South Korea
The Rise of Digital Partners: AI Becomes Wiresexuals’ Safe, Convenient, and Controllable Haven
Amazon founder Jeff Bezos: AI hype is a bubble!
Why does the United States buy rare earths from China despite its own reserves?
RediShell: A 13-year-old score 10 RCE has been upgraded to Redis
An 8-year-old critical bug in the Unity game engine poses risks to Android and Windows.
FIDO Downgrade Attacks, a New Authentication Threat
Redazione RHC - August 21st, 2025
Mozilla Fixes Dangerous RCE Bug in Firefox 142
Redazione RHC - August 21st, 2025
Spyware under fire! Apple releases a critical patch for a 0day used on iOS and iPadOS
Redazione RHC - August 21st, 2025
LastPass, 1Password, and Keeper under fire! Widespread zero-day bugs detected, putting millions of users at risk.
Redazione RHC - August 21st, 2025
Zero-Day RCE Exploit for Windows Selling for $125,000: How to Protect Yourself
Redazione RHC - August 21st, 2025
Nike Under Fire! IT Infrastructure Access for Sale from an Initial Access Broker
Redazione RHC - August 20th, 2025
A critical bug in Ollama allows for model replacement attacks
Redazione RHC - August 20th, 2025
When Criminal Hackers Patch Linux Servers for You! And That’s Not a Good Thing
Redazione RHC - August 20th, 2025
AI Wants Nuclear Power! Google, Kairos Power, and TVA Team Up for Sustainable Energy
Redazione RHC - August 20th, 2025
McDonald’s hacked by BobDaHacker! Better him than real cybercriminals
Redazione RHC - August 19th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…

In the past, many users and system administrators have relied on Microsoft’s telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation Key) licenses were widely available.…

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…











