Ultime news
ChatGPT becomes a social media platform: private messaging is coming soon.
25,000 kilometers, the new Seacom2.0 submarine cable to connect Europe, Africa and Asia
DeepSeek challenges AI giants: 50% cost and API cuts
Oracle E-Business Suite 9.8 Vulnerability: Urgent Updates Needed
iPad with M5 chip spotted: Promising performance on Geekbench
China launches underwater data center to reduce carbon footprint
OT Under Fire! CISA Releases Critical Asset Inventory Guide
Redazione RHC - August 18th, 2025
The MadeYouReset vulnerability in HTTP/2 can be exploited in powerful DDoS attacks
Redazione RHC - August 18th, 2025
Microsoft: $250 million in salaries for AI talent
Redazione RHC - August 18th, 2025
RIP Microsoft PowerShell 2.0! The end of an era is coming between August and September
Redazione RHC - August 18th, 2025
SQLite, Nginx, and Apache collapse in a day. Will hackers and AI agents revolutionize bug hunting?
Redazione RHC - August 17th, 2025
The KING of passwords is getting a makeover! Hashcat 7.0.0 is here: refactoring is out!
Redazione RHC - August 17th, 2025
The world’s first robotic womb arrives: will an android give birth to babies by 2026?
Redazione RHC - August 17th, 2025
Microsoft Teams Under Increasingly Under Fire. EncryptHub Compromised Corporate Networks with Malware
Redazione RHC - August 17th, 2025
A critical vulnerability has been discovered in Microsoft Web Deploy
Redazione RHC - August 17th, 2025
Is Artificial Intelligence Aiming to Eliminate the Middle Class?
Redazione RHC - August 17th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…

In the past, many users and system administrators have relied on Microsoft’s telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation Key) licenses were widely available.…

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…











