Ultime news
The “non-sensitive data” trap: the costly mistake for companies
With 50 dollars and physical access to the server, the Cloud goes to hell
Discovering the Emotional Firewall! The Vulnerability No One Is Patching
Not the children! 8,000 personal data of children from a nursery school are at risk of being published.
Programming in crisis: Junior job openings plummet as AI transforms the workplace.
Work, Artificial Intelligence, and Marketing: What Skills Will We Need in 2025?
HTTP/1.1 Must Die! Critical vulnerabilities put millions of websites at risk.
Redazione RHC - August 8th, 2025
A new Privilege Escalation (PE) technique allows UAC bypass on Windows
Redazione RHC - August 8th, 2025
The new Flipper Zero firmware made in DarkWeb becomes the key to every car
Redazione RHC - August 8th, 2025
AI Panic: We’re Entering the Most Dangerous Phase of the Digital Revolution
Redazione RHC - August 8th, 2025
Windows is losing ground. Linux is growing on corporate desktops, citing increased security.
Redazione RHC - August 8th, 2025
No Spyware for Every Crime! Germany Says No to Sentences Under Three Years
Redazione RHC - August 8th, 2025
Critical vulnerability in Google’s Gemini CLI allows malicious commands to be executed.
Redazione RHC - August 8th, 2025
Fortinet Discovers a New Obfuscated Web Shell. Analysis of UpdateChecker.aspx
Redazione RHC - August 8th, 2025
You’ve been paying for months for a VPN that has done nothing but spy on you
Redazione RHC - August 7th, 2025
Discovering Access Brokers. What are Initial Access Brokers (IaBs) and what do they sell in the underground market?
Redazione RHC - August 7th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…











