Ultime news
Shai-Hulud Attack: npm Supply Chain Compromised Again
ChatGPT to Introduce Targeted Ads, Changing Monetization Strategy
GitLab Security Updates Fix High-Severity Vulnerabilities CVE-2024-9183
Apache SkyWalking Vulnerability Exposes Users to XSS Attacks
Bloody Wolf Attacks Central Asia with NetSupport RAT via Java Exploits
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
IndonesianFoods: The Worm That’s Wreaking Havoc on npm and Created 100,000 Packages
Redazione RHC - November 15th, 2025
Vibe-Hacking: The New Frontier of Criminal Cybersecurity
Andrea Fellegara - November 15th, 2025
Two-Factor Authentication and MFA: Protect Your Accounts in 3 Easy Steps!
Redazione RHC - November 14th, 2025
John von Neumann: The Multifaceted Genius of 20th-Century Science
Carlo Denza - November 14th, 2025
The Wayback Machine “of souls” is coming soon. And so are the controversies
Redazione RHC - November 14th, 2025
The AI market is in crisis: NVIDIA and other tech giants are declining.
Redazione RHC - November 14th, 2025
A bug in ImunifyAV antivirus leads to RCE. 56 million sites at risk.
Redazione RHC - November 14th, 2025
Discovering Remote Code Execution (RCE). The most feared security bug!
Manuel Roccon - November 14th, 2025
Google, Amazon, and Meta and Their “Submarine War”
Redazione RHC - November 14th, 2025
TIM and Poste Italiane launch the sovereign cloud: the birth of the Italian-made AI and innovation hub
Redazione RHC - November 14th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…

In the past, many users and system administrators have relied on Microsoft’s telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation Key) licenses were widely available.…

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…











