Ultime news
Rhadamanthys Stealer: Introduces an AI feature to extract seed phrases from images
Active Directory nel mirino! Come i criminal hacker rubano NTDS.dit
YiBackdoor Arrives: What You Need to Know and How to Protect Your Network
Fezbox Malware: The NPM Package That Steals Cookies with QR Codes
Two Dutch men arrested on suspicion of espionage with ties to Russia
Ukrainian cyber attack paralyzes Russian SBP payment system
Auto-Color malware distributed via a vulnerability in SAP NetWeaver
Redazione RHC - August 1st, 2025
Oscar-winning bug for macOS/iOS! An encrypted email causes the device to crash.
Redazione RHC - July 31st, 2025
Mr Robot Teaches: A Raspberry Pi with 4G support used by hackers to access a bank’s network
Redazione RHC - July 31st, 2025
What is malware? Between science fiction, the lab, and reality.
Massimiliano Brolli - July 31st, 2025
What is vibe coding? Let’s discover the new frontier of programming.
Diego Corbi - July 31st, 2025
AI fever hits Wyoming! A 10-gigawatt data center will consume more electricity than 600,000 people.
Redazione RHC - July 31st, 2025
The secret AI race: the United States, China, and billions of dollars! And Europe? Who will win?
Redazione RHC - July 31st, 2025
Happy birthday and RIP Windows 10! Ten years of Windows, from successes to failures.
Redazione RHC - July 31st, 2025
Nokia under attack: database of nearly 100,000 employees appears for sale on DarkForums.
Redazione RHC - July 31st, 2025
Huawei Unveils Ascend 384 Super Node for AI at WAIC in Shanghai
Redazione RHC - July 31st, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…











