Ultime news
Digital Surveillance at Work: The Rise of Algorithmic Monitoring
Windows Server Vulnerability Exploited: ShadowPad Malware Deployed
Salesforce Data Breach: ShinyHunters Hack Gainsight Integration
BadAudio Discovered: Ghost Malware Used by APT24 for Three Years Undetected
Satoshi Nakamoto’s Net Worth Drops 34% as Cryptocurrency Crash
Cyberattack on Eurofiber France: Find out what happened
The world of software vulnerabilities: how they’re exploited, who creates them, and how to protect yourself.
Redazione RHC - November 11th, 2025
Exploring Cyberspace: States and Wars Without Geographic Borders
Massimiliano Brolli - November 11th, 2025
Who invented the World Wide Web? The story of Timothy Berners-Lee, the genius behind the web
Redazione RHC - November 11th, 2025
Marketing is nothing! VPNs sell themselves every time a government blocks adult sites
Redazione RHC - November 11th, 2025
Hackers: Who They Are, What They Do, and Their Role in Today’s World
Massimiliano Brolli - November 11th, 2025
The First Hackers in History: Hacking Is a Journey, Not a Destination
Massimiliano Brolli - November 11th, 2025
The extraordinary story of Alan Turing, the father of computer science: from his tumultuous childhood to his revolutionary contributions
Carlo Denza - November 11th, 2025
Wi-Fi Security: The Evolution from WEP to WPA3 and Self-Defending Networks
Francesco Demarcus - November 11th, 2025
The Windows 98 Blue Screen of Death That Changed Microsoft’s Plans
Redazione RHC - November 11th, 2025
Roblox: The Platform That Puts Children’s Safety at Risk
Redazione RHC - November 11th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…

In the past, many users and system administrators have relied on Microsoft’s telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation Key) licenses were widely available.…

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…











