Ultime news
SonicWall SMA1000 Vulnerability: Critical Security Patch Released
HPE OneView Vulnerability CVE-2025-37164: Critical Security Update Required
CISA Warns of Critical Vulnerabilities in Cisco, SonicWall, and ASUS Devices
Critical Windows Admin Center Flaw CVE-2025-64669 Exposes Servers to Attack
Ink Dragon Hackers Uncovered: Sophisticated Cyber Espionage Operation
Google Discontinues Dark Web Report, Shifts to Active Protection
Women in Cybersecurity: Breaking Down Barriers and Stereotypes
Ada Spinelli - December 15th, 2025
Storm-0249 Uses DLL Sideloading in Highly Targeted Attacks
Redazione RHC - December 15th, 2025
VS Code Extensions Infected with Sophisticated Malware via Typosquatting
Redazione RHC - December 15th, 2025
NVIDIA Merlin Security Update: Fixing High-Severity Vulnerabilities
Redazione RHC - December 15th, 2025
How Profanity Varies Across Social Media and Cultures
Redazione RHC - December 15th, 2025
GhostFrame Phishing Kit: New Stealthy PhaaS Threat Emerges
Redazione RHC - December 14th, 2025
WhatsApp: all it takes is a phone number to know when you sleep, go out, or come home
Redazione RHC - December 14th, 2025
Cyber Geopolitics: How Tech Becomes a Global Battleground
Roberto Villani - December 14th, 2025
SOAP Vulnerability in .NET Framework Allows Remote Code Execution
Redazione RHC - December 14th, 2025
CVE-2025-55182 React Server Components Vulnerability Exploited
Redazione RHC - December 13th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…

In the past, many users and system administrators have relied on Microsoft’s telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation Key) licenses were widely available.…











