Redazione RHC - December 23rd, 2025
A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data...
Redazione RHC - December 23rd, 2025
Texas Attorney General Ken Paxton has charged five major television manufacturers with illegally collecting user data using automatic content recognition (ACR) technology to record what owners watch. The charges concern...
Redazione RHC - December 23rd, 2025
Researchers at Check Point, a pioneer and global leader in cybersecurity solutions, have discovered a phishing campaign in which attackers pose as file-sharing and electronic signature services to send financially-themed...
Redazione RHC - December 22nd, 2025
The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption...
Redazione RHC - December 22nd, 2025
According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers...
Redazione RHC - December 22nd, 2025
A massive power outage in San Francisco has disrupted self-driving vehicle traffic. Waymo self-driving vehicles have been spotted on city streets, stopped at intersections with their emergency lights on. The...
Redazione RHC - December 22nd, 2025
In the past, many users and system administrators have relied on Microsoft's telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation...
Redazione RHC - December 22nd, 2025
Hackers love to exploit the most innocuous tools to infiltrate their targets' networks, and we all know this. And in this case, they're targeting PuTTY , the popular SSH client....
Redazione RHC - December 22nd, 2025
Cybercriminals are getting smarter and have found a new way to exploit corporate security protocols. It seems incredible, but it's true: they're using a legitimate Microsoft authentication feature to steal...
Redazione RHC - December 21st, 2025
A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence...