Ultime news
KaruHunters Claims Cyber Attack on RIPE NCC
Microsoft IIS under attack from Chinese criminal hackers: How UAT-8099 exploits authoritative websites
Computer science is no longer a safe career! What’s changing for students and companies?
China cracks down on fake news generated by artificial intelligence
China under surveillance: Users sanctioned for spreading fake news online
Asahi Group under hacker attack: beer supplies at risk
Critical vulnerability in Apache Tomcat must be patched, otherwise the server could go into DoS.
Redazione RHC - August 15th, 2025
After Darcula comes Magic Mouse: the new phishing nightmare steals 650,000 cards a month.
Redazione RHC - August 14th, 2025
Fortinet VPN Under Attack: New Wave of Brute-Force Attacks Detected by GrayNoise
Redazione RHC - August 14th, 2025
Whonix 17.4 is out! Only a 0day exploit can threaten your anonymity.
Redazione RHC - August 14th, 2025
Backdoor in xz Utils: 35 Docker Hub images still infected
Redazione RHC - August 14th, 2025
Huawei introduces algorithm that reduces dependence on foreign chips
Redazione RHC - August 14th, 2025
Did you meet a girl online? Four Ghanaians might have hit on you.
Redazione RHC - August 14th, 2025
Microsoft Office: Three Critical Vulnerabilities: Update Now
Redazione RHC - August 14th, 2025
Self-programming AI: 2025 could mark a turning point for programmers
Carlo Denza - August 14th, 2025
The Sexualisation of AI: A Warning for Humanity
Ashleigh Crause - August 13th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…

In the past, many users and system administrators have relied on Microsoft’s telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation Key) licenses were widely available.…











