Ultime news
Fake Microsoft Teams installer! One-time certificates and a backdoor in the download
The pregnancy robot is coming! Is it fake news or a harbinger of things to come?
NIST Towards Post-Quantum Cryptography
Critical flaws in Chinese robots. A zombie robot bonet can be remotely controlled.
Akira Ransomware: New Campaign Targets SonicWall Firewalls
Fujitsu unveils Post-K: the ARM supercomputer that will be 100 times faster than “K”
Cyborg Cockroaches: Singapore hosts the world’s first mass-produced cyborg cockroach.
Redazione RHC - August 4th, 2025
AI is hungry for energy! HyperGrid, the largest private nuclear complex, is underway.
Redazione RHC - August 3rd, 2025
“Vibe Coding” for Malware! A Malicious AI-Created Package Appears on NPM
Redazione RHC - August 3rd, 2025
What are Rootkits? Discovering one of the most insidious threats
Sandro Sana - August 3rd, 2025
Industroyer: The Malware That Shut Down Kiev and Threatens Global Power Grids
Massimiliano Brolli - August 3rd, 2025
Stuxnet: The Malware That Introduced Cyberwarfare to the World
Massimiliano Brolli - August 3rd, 2025
WannaCry: The Ransomware That Changed the World of Cybersecurity
Massimiliano Brolli - August 3rd, 2025
What is spyware: how it works and how it affects. The complete guide.
Redazione RHC - August 3rd, 2025
Discovering Wipers: The Silent Threat That Ruthlessly Destroys Data
Redazione RHC - August 3rd, 2025
What are Remote Access Trojans (RATs): The menacing shadow behind spam emails
Redazione RHC - August 3rd, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…










