Ultime news
Asus Hacked: Everest Ransomware Group Claims Data Breach
Fortinet Vulnerability: Critical FortiOS, FortiWeb, FortiProxy, FortiSwitchManager Update
Cybersecurity Certifications: Boost Your Career with CompTIA Security+
US Allows Nvidia to Sell Advanced AI Chips to China, Easing Export Restrictions
Taiwan Cracks Down on Submarine Cable Sabotage with New Laws
Ransomware Attacks Decline in 2024, But Threat Remains High with $734M in Ransom
Roblox Down Russia
Redazione RHC - December 3rd, 2025
Inside Lazarus! The fake candidate who fooled North Korean cyber spies
Redazione RHC - December 3rd, 2025
Kawasaki CORLEO Robot Quadrupede for Human Transport by 2035
Redazione RHC - December 3rd, 2025
Candle Subsea Cable Revolutionizes Asia-Pacific Internet Connectivity
Redazione RHC - December 3rd, 2025
Google Chrome 143 Patch Fixes Critical V8 JavaScript Vulnerability
Redazione RHC - December 3rd, 2025
Cybersecurity in December: How Compliance Hurries Leave Companies Vulnerable
Ambra Santoro - December 3rd, 2025
Managing AI Agents: Mitigating Security Risks in Autonomous Systems
Redazione RHC - December 3rd, 2025
Mistral AI Unveils Powerful Open Source Models for Advanced AI Applications
Redazione RHC - December 3rd, 2025
Maha Grass APT Group Unleashes StreamSpy Malware Attacks
Redazione RHC - December 3rd, 2025
Digital Crime Among Teenagers: Temporary Involvement
Redazione RHC - December 2nd, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…

In the past, many users and system administrators have relied on Microsoft’s telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation Key) licenses were widely available.…

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…











