Ultime news
WiFi Network Security: Protect Against Hacking with WPA3 and ARP Spoofing
ShadyPanda Malware Infects 4.3M Browsers with Chrome Edge Extensions
The Dark Side of Internet Control: Durov’s Warning
Phishing Attacks Surge in Black Friday Season: Stay Vigilant
Human Washing Machine Launched: Japan’s Science Unveils Unique Device
Brazilian Systems Targeted in Sophisticated OAST Exploit Campaign
Nuclear power entirely in the hands of AI! And what if there’s an accident?
Redazione RHC - November 17th, 2025
Veeam Analysis: Ransomware Payments Decline, But Data Resilience Remains Critical for EMEA Enterprises
Redazione RHC - November 17th, 2025
The History of GPS: The History of Satellite Navigation
Redazione RHC - November 17th, 2025
Tor Browser 15.0.1: Critical Vulnerability Fixes and Improvements
Redazione RHC - November 17th, 2025
16 Years of Go: An Innovative and Scalable Programming Language
Redazione RHC - November 17th, 2025
Google is ready to launch Gemini 3.0: will it really be the turning point in the AI race?
Redazione RHC - November 16th, 2025
The Louvre was deceived by two Belgian pranksters! They hung their painting next to the Mona Lisa.
Redazione RHC - November 16th, 2025
Are Black Hackers Demanding Ransom? Checkout.com Responds: We Fund Those Hunting You
Redazione RHC - November 16th, 2025
Trump, Hong Kong, and the Global Rush to Regulate Cryptocurrencies
Redazione RHC - November 16th, 2025
Sam Altman and her husband Oliver and the dream of genetically modified children
Redazione RHC - November 16th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…











