Ultime news
Cyberattack on Eurofiber France: Find out what happened
From Risk to Resilience: How Veeam Protects Your Supply Chain from Disruptions
When the Cloud Falls: How a Small Mistake Brought the Global Internet to Its Knees
Father and son break world speed record with homemade drone
Microsoft Blocks KMS38 Activation Method for Windows 10 and 11
Future prospects for computer science and technology graduates
The First Hackers in History: Hacking Is a Journey, Not a Destination
Massimiliano Brolli - November 11th, 2025
The extraordinary story of Alan Turing, the father of computer science: from his tumultuous childhood to his revolutionary contributions
Carlo Denza - November 11th, 2025
Wi-Fi Security: The Evolution from WEP to WPA3 and Self-Defending Networks
Francesco Demarcus - November 11th, 2025
The Windows 98 Blue Screen of Death That Changed Microsoft’s Plans
Redazione RHC - November 11th, 2025
Roblox: The Platform That Puts Children’s Safety at Risk
Redazione RHC - November 11th, 2025
The Origins of UNIX: The Original Bell Labs Tape Resurfaces from Utah
Redazione RHC - November 10th, 2025
21 Years of Firefox: A History of Innovation and Independence
Redazione RHC - November 10th, 2025
Hyundai subsidiary HAEA data breach: Sensitive information at risk
Redazione RHC - November 10th, 2025
Malware is a ticking time bomb! The threat to Siemens S7 PLCs begins in 2027.
Redazione RHC - November 10th, 2025
The Illicit Distribution of Intimate Images: A Threat to Women’s Freedom
Paolo Galdieri - November 10th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerability in the Linux kernel has caused…

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worrying security flaw in its…











