Ultime news
Apple in the crosshairs? Alleged 9GB data breach claim on Darkforums
When AI writes poetry: is the future of human creativity over?
The AI we love! From years to just months to discover a molecule for Crohn’s disease
Discord Confirms Hack Attack: Sensitive Information at Risk
SoopSocks: The PyPI Package That Looked Like a Proxy But Was a Backdoor to Windows
US raises alarm over core chip manufacturing: Too dependent on China by 2030
US embeds location tracking devices in AI chips to prevent hijackings to China
Redazione RHC - August 16th, 2025
Full-on spying! The Skydweller solar drone flies for nearly three days non-stop.
Redazione RHC - August 16th, 2025
Linux 6.17 Without BCachefs Due to Community Controversy
Redazione RHC - August 16th, 2025
Man Dies After Fake Encounter with Meta Chatbot
Redazione RHC - August 16th, 2025
Google Chrome goes privacy-first! A new script blocker for incognito mode
Redazione RHC - August 16th, 2025
Musk reveals he may lose control of Tesla
Redazione RHC - August 16th, 2025
After 18 years of silence, Anne begins to speak again. The new BCI technology from the University of Berkeley
Redazione RHC - August 16th, 2025
Will drones on missions be able to autonomously decide which men to kill?
Redazione RHC - August 15th, 2025
After the laundry, Figure 02 now folds the laundry. But for now, you’ll have to continue doing it yourself.
Redazione RHC - August 15th, 2025
Did you respond to IT support on Teams? Congratulations! The Trojan is on your PC with rights that exceed yours.
Redazione RHC - August 15th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…

In the past, many users and system administrators have relied on Microsoft’s telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation Key) licenses were widely available.…

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…











