Ultime news
CrowdStrike: Cybersecurity Enters the Age of AI Agents
Critical bug in Salesforce CLI: Arbitrary code execution and SYSTEM access
Google Chrome Zero-Day Vulnerability: CISA Warns and Files Bug on KEV
Violent social media and video games: the new ticking time bomb for teens.
WhatsApp introduces in-app message translation
TikTok, the app setting the US ablaze: billion-dollar deal for total control
Microsoft Betrayed from Within? Chinese Hackers Exploited SharePoint Bugs Before Patches
Redazione RHC - July 28th, 2025
Vibecoding to create ransomware: FunkSec cybergang uses AI for cyberattacks
Redazione RHC - July 28th, 2025
Germany invests in cyborg insects and AI robots for military and civilian use.
Redazione RHC - July 27th, 2025
What is Ethical Hacking: An Introduction to the Fascinating World of Ethical Hacking
Redazione RHC - July 27th, 2025
The Key to Software Security: CVSS 4.0 and Vulnerability Management
Redazione RHC - July 27th, 2025
What is Red Team? A journey into the world of offensive security experts.
Redazione RHC - July 27th, 2025
Why responsible vulnerability disclosure is important.
Redazione RHC - July 27th, 2025
OpenAI’s experimental model wins gold medal at the Mathematical Olympiad.
Redazione RHC - July 27th, 2025
Microsoft reduces AI’s environmental impact with human and agricultural waste.
Redazione RHC - July 27th, 2025
Discovering the Cyber Kill Chain. Defend your network and learn how to attack and defend yourself.
Redazione RHC - July 26th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…
CybercrimeAccording to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…
VulnerabilityThe following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…
CybercrimeA critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…











