Ultime news
Samsung under attack in Italy: phones held hostage by ransomware
PureVPN on Linux: Researcher Finds Security and Anonymity Issues
Ally Solos AI Glasses for the Visually Impaired: Autonomy and Safety
When Unicode Becomes a Weapon and Your Email Betrays You, Inboxfuscation Arrives
Scattered Spider: The teenage genius who hacked Las Vegas is in custody.
Cyberattacks on European airports: ENISA identifies ransomware
What are penetration tests, why are they done, who performs them, and the benefits for organizations.
Redazione RHC - July 22nd, 2025
What is Zero Trust Security? A Journey into the Future of Security 2.0
Redazione RHC - July 22nd, 2025
What are Common Vulnerabilities and Exposures (CVE)
Redazione RHC - July 22nd, 2025
What is Identity and Access Management (IAM)? Let’s find out how to protect your online identities.
Redazione RHC - July 22nd, 2025
New wave of Microsoft SharePoint Server attacks claims victims: over 100 organizations affected
Redazione RHC - July 22nd, 2025
16 flaws discovered in MediaTek chips: smartphones and smart TVs at risk!
Redazione RHC - July 22nd, 2025
Sophos fixes five vulnerabilities in Sophos Firewall, two of which are rated critical
Redazione RHC - July 22nd, 2025
TIM’s Red Team Research discovers five CVEs on Eclipse GlassFish, one critical (score 9.8)
Redazione RHC - July 21st, 2025
What is Secure Code Development? Discovering an essential practice in cybersecurity.
Redazione RHC - July 21st, 2025
What is Hardening: Discovering a Preemptive Strategy for Threat Mitigation
Redazione RHC - July 21st, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…
CybercrimeAccording to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…
VulnerabilityThe following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…
CybercrimeA critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…











