Ultime news
Balancing speed and security! This is the real challenge of Vibe Coding.
TOR Anonymizer v3.0: Advanced Digital Privacy Protection
Three serious vulnerabilities discovered in VMware vCenter and NSX: apply patches immediately.
0-day 0-click WhatsApp! All it takes is one image to take control of your iPhone.
Computer science graduates with no future! Thousands of resumes ignored, and goodbye to six-figure salaries.
The US wants to hack Telegram! The case sparks debate over privacy and jurisdiction.
ShadowSyndicate: The MaaS Infrastructure Behind Major Ransomware Attacks
Redazione RHC - August 6th, 2025
With ToolShell, you can access the Internet information Services (IIS) Machine keys.
Redazione RHC - August 6th, 2025
Would you like to have a robot that does the laundry? Figure’s robot does it.
Redazione RHC - August 5th, 2025
SonicWall in the crosshairs: possible 0-day vulnerability, users at risk
Redazione RHC - August 5th, 2025
Cisco Hit by a Vishing Attack! Registered Users’ Profile Data Exfiltrated
Redazione RHC - August 5th, 2025
The Monte Carlo Casino is on D4rk4rmy’s website! The ransomware group claims responsibility for the cyber attack.
Redazione RHC - August 5th, 2025
Ransomware Exploits SharePoint! 4L4MD4R Discovered, the Hybrid Attack That’s Even Scare Governments
Redazione RHC - August 5th, 2025
Critical Bugs on NVIDIA Triton Allow Attackers to Compromise and Steal AI Model
Redazione RHC - August 5th, 2025
Everyone’s talking about GPT-5. No one’s seen it. But the memes are already everywhere.
Redazione RHC - August 5th, 2025
PoisonSeed: How Phishing Attacks Bypass FIDO with WebAuthn
Redazione RHC - August 5th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…











