Ultime news
Zorin OS 18: The new beta version is now available
Forget brains and notebooks! ChatGPT dominates classrooms.
A US agency was hacked due to an unresolved patch. CISA: Conduct vulnerability assessments!
Ransomware attack on European airports leaves Berlin in “emergency mode”
Commodore 64: From the Legend of the ’80s to 2025! 10,000 New Consoles Sold
Two critical bugs in Cisco ASA and FTD: score 9.9 and risk of remote code execution
After NPM, now it’s PyPI’s turn: Python users, beware of this new phishing campaign.
Redazione RHC - July 30th, 2025
Linux Kernel 6.16 Released. New Features and Improvements Without Much Woww Effect
Redazione RHC - July 30th, 2025
Orange reports a serious security incident in France. A record 6,000 cars were put up for sale in the underground.
Redazione RHC - July 30th, 2025
Earthquake in Kamchatka, tsunami in the Pacific. The situation with undersea cables is under control.
Redazione RHC - July 30th, 2025
Raven Stealer is here! The malware that steals your data by using Telegram as a “training tool.”
Redazione RHC - July 30th, 2025
AI assistants lie! After generating errors: “I was panicking.”
Redazione RHC - July 30th, 2025
Sanctions are taking effect! Zhaoxin introduces KH-5000 server processors and KX-7000N desktop chip.
Redazione RHC - July 30th, 2025
The United States is cutting spending on cybersecurity again and it’s a storm
Redazione RHC - July 29th, 2025
What is tailgating? When penetration tests aren’t enough and the Red Team needs physical security checks.
Redazione RHC - July 29th, 2025
What is a Bug Bounty and what is a responsible disclosure program?
Redazione RHC - July 29th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…











