Ultime news
Cyber Insurance: Why Basic Hygiene Matters
Meta AI WhatsApp Investigation
Gulf States’ Digital Transformation: A New Era of Innovation and Security
Neurodivergence in Cybersecurity: A Hidden Competitive Advantage
Leroy Merlin Cyberattack Exposes Personal Data of French Customers
Anonymity for Sale: Russian SIM Card Market Thrives Amid Regulations
Digital Surveillance at Work: The Rise of Algorithmic Monitoring
Redazione RHC - November 24th, 2025
Windows Server Vulnerability Exploited: ShadowPad Malware Deployed
Redazione RHC - November 24th, 2025
Salesforce Data Breach: ShinyHunters Hack Gainsight Integration
Redazione RHC - November 24th, 2025
BadAudio Discovered: Ghost Malware Used by APT24 for Three Years Undetected
Redazione RHC - November 24th, 2025
Satoshi Nakamoto’s Net Worth Drops 34% as Cryptocurrency Crash
Redazione RHC - November 24th, 2025
Cyberattack on Eurofiber France: Find out what happened
Redazione RHC - November 24th, 2025
From Risk to Resilience: How Veeam Protects Your Supply Chain from Disruptions
Redazione RHC - November 24th, 2025
When the Cloud Falls: How a Small Mistake Brought the Global Internet to Its Knees
Gaia Russo - November 24th, 2025
Father and son break world speed record with homemade drone
Redazione RHC - November 23rd, 2025
Microsoft Blocks KMS38 Activation Method for Windows 10 and 11
Redazione RHC - November 23rd, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…

In the past, many users and system administrators have relied on Microsoft’s telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation Key) licenses were widely available.…

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…











