Ultime news
Discovering Prompt Injection: When AI Gets Fooled by Words
Can a camera read your mind? The answer comes from Portugal.
Microsoft challenges Nvidia and AMD with its proprietary chips for artificial intelligence.
China mandates AI content labels. Let’s see what’s happening.
MatrixPDF arrives: just a few clicks and phishing is served!
A critical bug in VMware Aria Operations and VMware Tools has been exploited by Chinese hackers for months.
Drones under fire! A NATO country orders a 100 kW laser for air defense.
Redazione RHC - August 10th, 2025
James Cameron: AI can cause devastation like Skynet and Terminator
Redazione RHC - August 10th, 2025
150 Malicious Firefox Extensions Stole $1 Million in Cryptocurrency
Redazione RHC - August 10th, 2025
Over 60s, Under Fire! Hackers Stole $700 Million from Seniors
Redazione RHC - August 10th, 2025
EDRs are still going offline! Threats are growing with EDRKillShifter’s offspring.
Redazione RHC - August 10th, 2025
GPT-5 Hacked in 24 Hours. Experts Find Surprising Weaknesses
Redazione RHC - August 9th, 2025
Did you double-click WinRAR? Congratulations! You’ve been compromised
Redazione RHC - August 9th, 2025
Satellites Under Hackers’ Control: “It’s Easier to Hack Them Than to Use Satellite Weapons”
Redazione RHC - August 9th, 2025
A step toward autonomous warfare. A drone can autonomously program its “brain system.”
Redazione RHC - August 9th, 2025
GPT-5 is here! The billion-dollar AI that devours GPUs and makes GPT-4 look like a toy.
Redazione RHC - August 9th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…











