Ultime news
CVE-2025-55182 React Server Components Vulnerability Exploited
Top 25 Software Vulnerabilities 2025: MITRE CWE Ranking and Security Tips
The Future of Work: 4-Day Week with AI and Tech Advances
ARTEMIS Leads in AI-Powered Pentesting, Outperforming Human Experts
Apple Patches Critical WebKit Vulnerabilities in iOS Update
Kali Linux 2025.4: Discover the Power of Wayland and Enhanced Security Tools
Taiwan Cracks Down on Submarine Cable Sabotage with New Laws
Redazione RHC - December 9th, 2025
Ransomware Attacks Decline in 2024, But Threat Remains High with $734M in Ransom
Redazione RHC - December 9th, 2025
Embracing Vulnerability for Authentic Leadership and Team Growth
Daniela Linda - December 9th, 2025
CISA Warns: Avoid Personal VPNs for Secure Mobile Communications
Redazione RHC - December 9th, 2025
SAP Security Update Fixes Critical Code Injection Vulnerability in Solution Manager
Redazione RHC - December 9th, 2025
Passwordless Authentication: The Future of Secure Online Access
Redazione RHC - December 9th, 2025
Critical PromptPwnd Vulnerability Exposes AI-Powered GitLab, GitHub Pipelines
Redazione RHC - December 9th, 2025
LLM-Powered Malware: The Future of Autonomous Cyber Threats
Redazione RHC - December 9th, 2025
Intellexa Exploits Zero-Day Vulnerabilities with Spyware
Redazione RHC - December 8th, 2025
Malaysia Cracks Down on Bitcoin Mining Thefts
Redazione RHC - December 8th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…

In the past, many users and system administrators have relied on Microsoft’s telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation Key) licenses were widely available.…

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…











