Ultime news
Cloudflare Blocks AI Bots: The Future of Internet Economy at Stake
React2Shell Vulnerability: 8.7M Servers at Risk – CVE-2025-55182
Cloudflare Just Broke the Internet… Again. Centralization Risks Exposed
Chinese Cyber Spies Use Brickstorm Malware to Infiltrate Critical Networks
Splunk Enterprise Vulnerability: CVE-2025-20386 and CVE-2025-20387
Apache HTTP Server Update Fixes Critical Security Vulnerabilities
Malware Uses Finger Command to Infect Windows Devices
Redazione RHC - November 26th, 2025
The Future of Tech: How to Navigate the Digital World
Redazione RHC - November 26th, 2025
Google Gemini 3.0 Shakes Nvidia’s AI Dominance with TPU Innovation
Redazione RHC - November 25th, 2025
CISA Warns of Spyware Attacks on Mobile Messaging Apps
Redazione RHC - November 25th, 2025
New ClickFix Malware Campaign Targets Windows Users with Fake Updates
Redazione RHC - November 25th, 2025
GDPR Data Breach: Email Errors and Consequences
Stefano Gazzella - November 25th, 2025
Ettore Accenti: The Italian Tech Pioneer Who Brought Intel to Italy
Carlo Denza - November 25th, 2025
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Redazione RHC - November 25th, 2025
Anthropic Releases Claude Opus 4.5: AI Model for Enhanced Productivity
Redazione RHC - November 24th, 2025
Alibaba Qwen3Max Dominates AI Market with Rapid Growth
Redazione RHC - November 24th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…

In the past, many users and system administrators have relied on Microsoft’s telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation Key) licenses were widely available.…

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…











