Ultime news
The future of submarine cables: 48% longer by 2040. Are we really ready?
Klopatra Arrives! The Banking Trojan That Threatens Android Users
Data Act: Yet another regulation? Yes. But this one really changes the game (even for those in security).
Google Drive defends itself from ransomware! AI blocks attacks
Microsoft Outlook is in chaos: the Windows client crashes and blocks mailboxes.
Phantom Taurus: The Chinese Hacker Group That Spies on Governments and Embassies
China is focusing on humanoid robots! A package of measures is coming for 10,000 units by 2027.
Redazione RHC - August 12th, 2025
Siri Sends Data to Apple Without Warning: AppleStorm Reveals the Truth
Redazione RHC - August 11th, 2025
Linus Torvalds: “This is Garbage!” Criticizes the RISC-V Patch for Linux 6.17
Redazione RHC - August 11th, 2025
New 7-Zip flaw: Symbolic links turn extraction into a hack
Redazione RHC - August 11th, 2025
A 60-year-old man was hospitalized for three weeks following ChatGPT’s medical advice.
Redazione RHC - August 11th, 2025
New 7-Zip flaw: Symbolic links turn extraction into a hack
Redazione RHC - August 11th, 2025
BadUSB. Webcam Spyware: The Lenovo Bug Threatening Millions of PCs
Redazione RHC - August 11th, 2025
Win-DoS Epidemic: New DoS and DDoS Attacks Start with Microsoft Windows
Redazione RHC - August 11th, 2025
ElectroSim: The Ethical Hackers’ Virtual Environment for Studying OT/ICS Security Flaws
Redazione RHC - August 11th, 2025
Windows 12 and 13: goodbye mouse and keyboard! Will user interaction be voice-only?
Redazione RHC - August 10th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…










