Ultime news
Windows 10 Still Running on 1 Billion PCs, Upgrade to Windows 11 Urged
Secure AI Integration in OT Systems: Key Principles and Best Practices
Aisuru Botnet Unleashes 29.7 Tbps DDoS Attack, Cloudflare Mitigates
Critical Vulnerability in Iskra iHUB Devices Exposed
Roblox Down Russia
Inside Lazarus! The fake candidate who fooled North Korean cyber spies
Critical Vulnerability in Azure Bastion Scores 10! When RDP and SSH in the Cloud Are Checkmated
Redazione RHC - November 21st, 2025
Risk averted for millions of Microsoft users! The critical vulnerability in Microsoft SharePoint 9.8
Redazione RHC - November 21st, 2025
Sturnus, the banking Trojan that intercepts WhatsApp, Telegram, and Signal messages
Redazione RHC - November 21st, 2025
Disloyal Employees: Fired, Returns to Work, and Resets 2,500 Passwords Without the Company’s Knowledge
Redazione RHC - November 21st, 2025
MONOLOCK: The new “silent” ransomware group that rejects leak sites and affiliate panels.
Luca Stivali - November 21st, 2025
Critical vulnerability in the WordPress plugin W3 Total Cache. 430,000 sites at risk!
Redazione RHC - November 21st, 2025
Hundreds of robots on the march: China presents the new generation of humanoids
Redazione RHC - November 21st, 2025
Veeam launches Data Platform v13, redefining the standard for cyber resilience and advanced data protection.
Redazione RHC - November 20th, 2025
Happy birthday, Windows! 40 years of operating system history and still going strong.
Redazione RHC - November 20th, 2025
World Children’s Day: Children live in digital, but digital wasn’t designed for them.
Simone D'Agostino - November 20th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…

In the past, many users and system administrators have relied on Microsoft’s telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation Key) licenses were widely available.…

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…











