Ultime news
Supply Chain: The blockade of European airports raises concerns about an increasingly critical issue.
Dedigitalization: Japanese city of Toyoda restricts smartphone use
ShadowV2: New MaaS botnet for DDoS attacks uses containers
GitHub strengthens npm security against supply chain attacks.
Towards AGI: Google DeepMind warns, AI could ignore humans
From Debugging to Breaking: Turning Crash Dumps into EDR Kill Switches
What is Cyber Threat Intelligence? Let’s explore a fundamental discipline in cybersecurity.
Redazione RHC - July 26th, 2025
What is Open Source Intelligence (OSINT). Its importance and necessity in today’s world.
Redazione RHC - July 26th, 2025
What are Vulnerability Assessments? A Journey into Automated Software Vulnerability Scanning
Redazione RHC - July 26th, 2025
Is the Linux kernel moving toward “vibe coding”? Rules for using AI assistants are coming soon.
Redazione RHC - July 26th, 2025
Google is turning the web into a showcase for AI! A near-term disaster for the digital economy.
Redazione RHC - July 26th, 2025
Koske: Linux Malware Developed with Artificial Intelligence
Redazione RHC - July 26th, 2025
Beyond the Code: When AI Reminds Us Who We Are
Redazione RHC - July 26th, 2025
SharePoint Exploits Are Underway: Businesses and Organizations in the Crosshairs
Redazione RHC - July 26th, 2025
A hacker compromises Amazon Q. Data is erased from users’ computers with a prompt from Wiper.
Redazione RHC - July 25th, 2025
Deepfake: Every citizen owns the copyright to their own face and voice.
Redazione RHC - July 25th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…
CybercrimeAccording to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…
VulnerabilityThe following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…
CybercrimeA critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…











