Ultime news
First malware with integrated GPT-4 discovered: MalTerminal arrives
The winners of the AI race? Electricians and plumbers.
SonicWall warns customers to change credentials after security breach
“He doesn’t understand me, but ChatGPT does”: The 21st-century love triangle
Major DarkForums Leak: 196 Italian Sites Exposed with Clear FTP Credentials
From Leash to Autonomy: Ban, Nvidia Block, and Huawei’s AI Cluster Solutions
Patch Management: The process to adopt to make your company more secure from cyber attacks
Redazione RHC - July 21st, 2025
What are security bugs? A journey through PoCs, exploits, bug bounty programs, and work.
Redazione RHC - July 21st, 2025
Vulnerability in 7-Zip: Attackers can perform denial-of-service attacks
Redazione RHC - July 21st, 2025
ToolShell: The New Threat Affecting Microsoft SharePoint Servers
Redazione RHC - July 21st, 2025
Uncle Bot, the humanoid robot that’s conquering China and scaring the US
Redazione RHC - July 20th, 2025
Viral Minds: How the Internet Turned Social Contagion Into a Global Psychological Weapon
Ashleigh Crause - July 20th, 2025
Millions of vehicles at risk of RCE attacks via the PerfektBlue Bluetooth bug
Redazione RHC - July 20th, 2025
Mercedes-Benz and Microsoft are teaming up to integrate Teams and Copilot 365 into cars starting this summer.
Redazione RHC - July 20th, 2025
What is ICT Risk Management? A process that supports cybersecurity.
Redazione RHC - July 20th, 2025
How to Start a Cyber Security Program: The First Steps
Redazione RHC - July 20th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…
CybercrimeAccording to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…
VulnerabilityThe following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…
CybercrimeA critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…











