A London court has sentenced 47-year-old Chinese woman Zhimin Qian , also known as Yadi Zhang, to 11 years and eight months in prison for laundering bitcoin obtained through the...
Many years have passed since the SQL Slammer worm spread uncontrollably on January 25, 2003. It was one of the fastest-spreading malware in history , and with this article we...
We all know Bruce Schneier , a renowned cryptography and computer security expert, member of the board of directors of the International Association for Cryptological Research and a renowned speaker,...
At first we talked about “viruses” , then “worms” appeared, followed by “macro viruses”. These were soon joined by other types of hostile software such as keyloggers or lockers. At...
As we know, there are different types of cybercriminals. There are ethical hackers and criminal hackers. Within criminal hackers, there are a multitude of dimensions, including, specifically, nation-state-funded hacker groups...
Chinese manufacturer GMKtec has presented its new EVO-X2 mini PC , equipped with a Ryzen AI Max+ 395 processor , claiming performance comparable – and in some cases superior –...
We're talking about 11 billion euros. A staggering figure! China's National Computer Virus Emergency Response Center (CVERC) said that a state-run entity, likely U.S. , was behind a 2020 attack...
NetScaler and Citrix - On November 11, 2025, released security bulletin CTX695486 regarding the CVE-2025-12101 vulnerability, which affects the NetScaler ADC and NetScaler Gateway products. The vulnerability is rated "...
In the age of rapid advances in artificial intelligence, Wikipedia's importance as a reliable source of knowledge has become particularly significant. While neural networks generate text, images, and videos, their...
Among the many strategies used by attackers, one of the most insidious is represented by Command and Control (C2) Servers. We often discuss them on the pages of RHC, but...