Ultime news
Can a backdoor be implemented for only one country? Apple resists UK demands.
KaruHunters Claims Cyber Attack on RIPE NCC
Microsoft IIS under attack from Chinese criminal hackers: How UAT-8099 exploits authoritative websites
Computer science is no longer a safe career! What’s changing for students and companies?
China cracks down on fake news generated by artificial intelligence
China under surveillance: Users sanctioned for spreading fake news online
Google fixes critical bug in Gemini that allows tracking of users
Redazione RHC - August 15th, 2025
It only took one too many! Phishing scam impersonating Booking.com using homoglyphics.
Redazione RHC - August 15th, 2025
Cobalt Strike for everyone with CrossC2! We’re paying attention to Linux servers without EDR
Redazione RHC - August 15th, 2025
Bug da Oscar (score 10) per Cisco Secure Firewall Management Center
Redazione RHC - August 15th, 2025
The Robot Girlfriend is coming! The new frontier of Chinese-made technology.
Redazione RHC - August 15th, 2025
Critical vulnerability in Apache Tomcat must be patched, otherwise the server could go into DoS.
Redazione RHC - August 15th, 2025
After Darcula comes Magic Mouse: the new phishing nightmare steals 650,000 cards a month.
Redazione RHC - August 14th, 2025
Fortinet VPN Under Attack: New Wave of Brute-Force Attacks Detected by GrayNoise
Redazione RHC - August 14th, 2025
Whonix 17.4 is out! Only a 0day exploit can threaten your anonymity.
Redazione RHC - August 14th, 2025
Backdoor in xz Utils: 35 Docker Hub images still infected
Redazione RHC - August 14th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…

In the past, many users and system administrators have relied on Microsoft’s telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation Key) licenses were widely available.…

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…











