Ultime news
Google Chrome: Urgent patch for exploited 0day. Critical vulnerabilities fixed.
Phishing with style! Cybercriminals attach superhero GIFs to malware.
Will this latest article “against” ChatControl be absolutely useless?
Azure Functions in the Spotlight: Legitimate Libraries Used for DLL Sideloading
Linux Hit by Sindoor Dropper: Highly Obfuscated Infection Chain
A manifesto after 72 hours! Will cybercriminals really retreat?
A RCE vulnerability in Wing FTP Server rated 10 opens the door to 10,000 companies.
Redazione RHC - July 12th, 2025
There’s no such thing as zero risk! There’s only one risk you need to know to manage.
Redazione RHC - July 12th, 2025
Working in cybersecurity. Cybersecurity needs you.
Redazione RHC - July 12th, 2025
What is cyber warfare? Between geopolitics, economics, and technology.
Redazione RHC - July 12th, 2025
AI stymied by energy constraints, innovative space solutions needed
Redazione RHC - July 12th, 2025
Donald Trump admits the US is hacking China: “That’s the way of the world.”
Redazione RHC - July 12th, 2025
TapTrap Attack: How to Get Yourself to Click Things Even Your Mom Wouldn’t Approve of
Redazione RHC - July 11th, 2025
AI will end the traditional software industry just as the Internet has changed traditional media.
Redazione RHC - July 11th, 2025
Critical Vulnerability in the Linux Kernel: A New Privilege Escalation
Redazione RHC - July 11th, 2025
RHC interviews Sector16, one of the most active hacktivist groups of 2025. “Let’s destroy the present for a better future”
RHC Dark Lab - July 11th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…
CybercrimeAccording to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…
VulnerabilityThe following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…











