Ultime news
China surpasses US in open-source AI models
ENISA takes on the role of Root in the European Cybersecurity Initiative (CVE).
Supply Chain Attack on OpenAI: Analytics Provider Mixpanel Compromised
Be careful when using SSDs! Without power, you risk data loss
Quantum Computing vs. Artificial Intelligence: Which Will Really Change the Future?
ToddyCat APT Group Targets Microsoft 365 Email Security
Two 0-day attacks, one attack: the perfect strike against Citrix and Cisco. Amazon’s discovery
Redazione RHC - November 13th, 2025
The Queen of Cryptocurrency Has Been Captured! She Stole $7 Billion in Bitcoin
Redazione RHC - November 13th, 2025
Cyber Sabotage Alert: Volt Typhoon Prepares for Destructive Activities
Redazione RHC - November 13th, 2025
Microsoft fixes 63 vulnerabilities, including an actively exploited zero-day
Redazione RHC - November 13th, 2025
Italy and Adult Sites: The Country Where Entry Is Forbidden… But If You Click Yes, It’s Okay
Redazione RHC - November 13th, 2025
Top Malware: Flame, the modular “spy” malware targeting the Middle East.
Massimiliano Brolli - November 12th, 2025
Slammer, the first worm to use a bug that hasn’t been fixed for six months.
Redazione RHC - November 12th, 2025
The Story of the First Keylogger: How Hidden Keyboard Control Came to Be
Redazione RHC - November 12th, 2025
A Brief History of Malware: The Evolution of the Species from Its Origins to the Present Day
Redazione RHC - November 12th, 2025
What Are Large Language Models? Behind the Scenes of Artificial Intelligence
Marcello Politi - November 12th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…

In the past, many users and system administrators have relied on Microsoft’s telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation Key) licenses were widely available.…

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…











