Ultime news
Candle Subsea Cable Revolutionizes Asia-Pacific Internet Connectivity
Google Chrome 143 Patch Fixes Critical V8 JavaScript Vulnerability
Cybersecurity in December: How Compliance Hurries Leave Companies Vulnerable
Managing AI Agents: Mitigating Security Risks in Autonomous Systems
Mistral AI Unveils Powerful Open Source Models for Advanced AI Applications
Maha Grass APT Group Unleashes StreamSpy Malware Attacks
Meta and Google suspend construction of two undersea cables due to instability in the Red Sea
Redazione RHC - November 20th, 2025
Let the hunt begin! Critical 7-Zip bug puts millions of users at risk.
Redazione RHC - November 20th, 2025
Python to Rust: A More Secure Future for the Programming Language
Redazione RHC - November 19th, 2025
Multi-threaded Hacking: US Pioneers Automated Operations with AI Agents
Redazione RHC - November 19th, 2025
WhatsApp data leak: 3.5 billion numbers “stolen” by researchers at the University of Vienna
Redazione RHC - November 19th, 2025
Google launches Gemini 3, its most advanced artificial intelligence model
Redazione RHC - November 19th, 2025
CISA’s ‘Secure by Design’ Pledge: A Year of Progress in Cybersecurity
Redazione RHC - November 19th, 2025
Cloudflare global outage: It was an internal technical error. Let’s find out the cause.
Redazione RHC - November 19th, 2025
Cloudflare goes down in the magnificent cloud! Global incident is being resolved.
Redazione RHC - November 18th, 2025
Cloudflare Down: Websites and Services to Go Down on November 18, 2025
Redazione RHC - November 18th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…

In the past, many users and system administrators have relied on Microsoft’s telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation Key) licenses were widely available.…

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…











