Ultime news
11 death sentences for online fraud. China deals a severe blow to cybercrime
Is it possible to heat a house with Raspberry Pi? In the UK, the answer is yes.
Scattered LAPSUS$ Hunters Group Returns and Threatens to Release Salesforce Data
Securing WebSocket Connections: Risk, Analysis, and Practical Measures
Italy is a part of the Zero Day world! The first Italian CNAs are Leonardo and Almaviva!
WhatsApp Alert: New Malware Spreads Like a Virus Among Contacts
Roblox under fire in Louisiana: A haven for sexual predators
Redazione RHC - August 19th, 2025
Do you click on text message links? Here are 4.2 million reasons not to.
Redazione RHC - August 19th, 2025
Criminal Hackers Exploit Cisco Safe Links for Phishing Attacks
Redazione RHC - August 19th, 2025
Ghost-tapping: How Asian scammers launder money with stolen credit cards
Redazione RHC - August 19th, 2025
Electronic Warfare. China develops a lamp that blocks enemy radar for miles.
Redazione RHC - August 19th, 2025
Critical Score 10 Vulnerability in Erlang/Open Telecom Platform: Active Exploits on the Rise
Redazione RHC - August 19th, 2025
Can’t find your Tesla? No problem: there’s Free TeslaMate.
Redazione RHC - August 18th, 2025
Proton leaves Switzerland for Europe! €100 million for Lumo artificial intelligence
Redazione RHC - August 18th, 2025
After XSS’s shutdown, Rehubcom arrives. The Dark Web continues.
Redazione RHC - August 18th, 2025
Tesla’s Dojo project is dead. A technological gamble ended in resounding failure.
Redazione RHC - August 18th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…

In the past, many users and system administrators have relied on Microsoft’s telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation Key) licenses were widely available.…

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…











