Ultime news
As Windows 10 retires, Windows 7 installs double in two months
Bill Gates: Programmers are not at risk! AI is a tool, not a competitor.
Global attacks on Cisco devices: Cyber agencies warn of ongoing crisis
A DLL hijacking bug targets Notepad++. Risk of arbitrary code execution.
Google Project Zero Researcher Reveals How to Bypass ASLR on macOS and iOS
Make training an adventure! Choose Betti RHC for your cybersecurity awareness.
Apple Develops Its Own Artificial Intelligence Engine to Power Siri
Redazione RHC - August 5th, 2025
Proxy Trickster: The Amateur Hackers Group That Wants to Own Servers Worldwide
Redazione RHC - August 5th, 2025
Malware disguises itself as an innocent photo on Dropbox. APT37’s steganographic strategy
Redazione RHC - August 4th, 2025
BitLocker Under Attack! A New Technique Enables Lateral Movement While Eluding Security Controls
Redazione RHC - August 4th, 2025
Mozilla warns Firefox extension developers of active phishing campaign
Redazione RHC - August 4th, 2025
Is Open Source Going Away? KubeSphere Discontinues Distribution, Ensuing Storm
Redazione RHC - August 4th, 2025
$14.5 billion stolen from LuBian! It’s the largest cryptocurrency theft in history.
Redazione RHC - August 4th, 2025
Companies Go Bankrupt Due to Ransomware! Einhaus Group Shuts Down, Serving as a Warning to Everyone
Redazione RHC - August 4th, 2025
The Ransomware Nightmare Gets Worse: “We Know Where Your Kids Live.” The New Frontier of Cybercrime
Redazione RHC - August 4th, 2025
Chinese-Made Digital Espionage: APT41 Uses SharePoint to Infiltrate African Governments
Redazione RHC - August 4th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…











