Ultime news
Critical Linux Vulnerability: 0-Click N-Days Exploit Allows Remote Code Execution
Security alert for AI servers: thousands are at risk
DeliveryRAT Trojan Alert: Hackers Steal Data and Money with Fake Apps
Plato, the cave, and social media: are we only looking at shadows?
Vibe coding, yes, but be careful. Speed doesn’t always beat quality.
The Great Firewall in the Spotlight: The Leak Revealing the Industrialization of Chinese Censorship
Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam
Redazione RHC - July 7th, 2025
He’s 13 and Hacked Microsoft Teams! The Story of Dylan, One of the Youngest Bug Hunters
Redazione RHC - July 6th, 2025
He’s 13 and Hacked Microsoft Teams! The Story of Dylan, One of the Youngest Bug Hunters
Redazione RHC - July 6th, 2025
Discovering the Jargon File! The Living Relic of Hacker Culture
Redazione RHC - July 5th, 2025
The History of Email. How This Invention Impacted the Modern Era
Redazione RHC - July 5th, 2025
The “Declaration of Independence of Cyberspace”
Redazione RHC - July 5th, 2025
Satoshi Nakamoto: Discover the Mysterious Inventor of Bitcoin.
Redazione RHC - July 5th, 2025
After Encrypting Half the World, Hunters International Shuts Down! Decryptor Distributed for Free
Redazione RHC - July 4th, 2025
DarkForums Takes Over BreachForums’ Telegram Channel “The Jacuzzi”
Redazione RHC - July 4th, 2025
Patch Chaos: Windows 11 Update Breaks PDF Printing
Redazione RHC - July 3rd, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…
CybercrimeAccording to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…
VulnerabilityThe following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…










