Ultime news
ShadowLeak Arrives: A 0-Click Bug in ChatGPT Leads to Sensitive Data Exfiltration
Generative Artificial Intelligence: Explosive Growth and Security Challenges
GitLab fixes critical vulnerability CVE-2025-6454
Supply Chain Wormable? NPM Packages with Self-Propagating Malware Arrive
The KING of RaidForums remains in limbo. The battle between the US and Portugal over his extradition continues.
Italy under DDoS attack by pro-Russian NoName057(16)? Few disruptions.
What is phishing? Let’s avoid falling for the hack-fisherman’s bait.
Redazione RHC - July 14th, 2025
What are supply chain attacks? A more concrete threat than ever.
Redazione RHC - July 14th, 2025
I use macOS because it’s secure! Atomic Stealer: €1,000 per month with backdoor features
Redazione RHC - July 14th, 2025
Commodore 64: The return of the best-selling retro computer of all time is now
Redazione RHC - July 13th, 2025
The History of the Linux Kernel (2 of 2). Early Hackers Up to Version 1.0.
Redazione RHC - July 13th, 2025
The History of the Linux Kernel (1 of 2). From Torvalds to the Hacker Community
Redazione RHC - July 13th, 2025
Cult of the Dead Cow (cDc). The story of the most famous hacker group.
Redazione RHC - July 13th, 2025
Apple 2: the story of a great success.
Redazione RHC - July 13th, 2025
Russian domestic hackers Cozy Bear (APT29). Analysis of the main attacks and their TTPs.
Redazione RHC - July 13th, 2025
Critical Vulnerability in FortiWeb: Score 9.6 and Unauthorized SQL Commands
Redazione RHC - July 13th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…
CybercrimeAccording to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…
VulnerabilityThe following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…











