Ultime news
Goodbye, Windows 10! Microsoft warns that updates will end on October 14th.
BitLocker in the crosshairs: stealth attacks via COM hijacking. Online PoC
From image theft to deepfakes: the new frontier of digital manipulation
The ChillyHell backdoor returns to threaten macOS systems.
Regulating out-of-office work: a best practice for organizations and beyond.
Apple introduces Memory Integrity Enforcement. Will this be the end of hacking?
The Race to 0day! China Advances in Offensive Cyberpower, While the US Is Forced to Chase
Redazione RHC - June 30th, 2025
Cyberbullying and Digital Terror: Why Betti’s Comic Makes You Feel Uncomfortable (and That’s a Good Thing)
Redazione RHC - June 29th, 2025
Miniaturized Military Drone, Mosquito-Sized Model Arrives and China Offers It
Redazione RHC - June 29th, 2025
Cybersecurity, Italy on the podium with four young people. There is also Leonardo already protagonist in the RHC CTF
Redazione RHC - June 28th, 2025
Cyber Security: CISA and NSA Recommend Secure Programming Languages
Redazione RHC - June 28th, 2025
Apple and Google under pressure: German regulator wants to remove DeepSeek
Redazione RHC - June 28th, 2025
A former Australian university student has been accused of hacking Western Sydney University
Redazione RHC - June 28th, 2025
Cyber War: The Invisible War in Cyberspace That Decides the Conflicts of the Present
Paolo Galdieri - June 27th, 2025
Skynet is coming: the malware that attacks Artificial Intelligence!
Redazione RHC - June 27th, 2025
Cybersecurity, from NIS2 to the Cyber Resilience Act: Fortinet guides companies in compliance with the new regulatory landscape
Redazione RHC - June 27th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeStraiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…
CybercrimeAccording to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…











