Ultime news
ShadowV2: New MaaS botnet for DDoS attacks uses containers
GitHub strengthens npm security against supply chain attacks.
Towards AGI: Google DeepMind warns, AI could ignore humans
From Debugging to Breaking: Turning Crash Dumps into EDR Kill Switches
RAN Hacking: US Intelligence Uncovers Clandestine Cellular Network in New York
Chrome for Android: From a “wall of text” to a podcast is a short step.
Commodore 64: The return of the best-selling retro computer of all time is now
Redazione RHC - July 13th, 2025
The History of the Linux Kernel (2 of 2). Early Hackers Up to Version 1.0.
Redazione RHC - July 13th, 2025
The History of the Linux Kernel (1 of 2). From Torvalds to the Hacker Community
Redazione RHC - July 13th, 2025
Cult of the Dead Cow (cDc). The story of the most famous hacker group.
Redazione RHC - July 13th, 2025
Apple 2: the story of a great success.
Redazione RHC - July 13th, 2025
Russian domestic hackers Cozy Bear (APT29). Analysis of the main attacks and their TTPs.
Redazione RHC - July 13th, 2025
Critical Vulnerability in FortiWeb: Score 9.6 and Unauthorized SQL Commands
Redazione RHC - July 13th, 2025
A RCE vulnerability in Wing FTP Server rated 10 opens the door to 10,000 companies.
Redazione RHC - July 12th, 2025
There’s no such thing as zero risk! There’s only one risk you need to know to manage.
Redazione RHC - July 12th, 2025
Working in cybersecurity. Cybersecurity needs you.
Redazione RHC - July 12th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeFor over a year, the North Korean group PurpleBravo has been running a targeted malware campaign called “Contagious Interview,” using fake job interviews to attack companies in Europe, Asia, the Middle East, and Central America.…
CybercrimeCheck Point Research recently discovered a sophisticated phishing campaign orchestrated by KONNI , a threat group linked to North Korea . Historically focused on diplomatic targets in South Korea, the malicious actor has now expanded…
CybercrimeAttackers are exploiting a previously patched critical FortiGate authentication flaw (CVE-2025-59718) through a patch bypass method to breach protected firewalls, as Fortinet customers are experiencing. Fortinet reportedly plans to soon release FortiOS versions 7.4.11, 7.6.6,…
CybercrimeA critical zero-day remote code execution (RCE) vulnerability, identified as CVE-2026-20045, has been discovered by Cisco and is being actively exploited in active attacks. Cisco has urged immediate patching, and its Product Security Incident Response…
innovationIn the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and Hack The Box (HTB) for…











