Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

HackTheBox 970x120 1
Precedente Successivo

Latest news

AI will end the traditional software industry just as the Internet has changed traditional media. Cyber News

AI will end the traditional software industry just as the Internet has changed traditional media.

Generative AI, including tools like Cursor and ClaudeCode, are dramatically reducing the cost and time of software development. What once...
Redazione RHC - July 11, 2025
Critical Vulnerability in the Linux Kernel: A New Privilege Escalation Cyber News

Critical Vulnerability in the Linux Kernel: A New Privilege Escalation

A critical double-free vulnerability has been discovered in the pipapo set module of the NFT subsystem of the Linux kernel....
Massimiliano Brolli - July 11, 2025
RHC interviews Sector16, one of the most active hacktivist groups of 2025. “Let’s destroy the present for a better future” Cybercrime

RHC interviews Sector16, one of the most active hacktivist groups of 2025. “Let’s destroy the present for a better future”

In recent months, two disturbing episodes have shaken public opinion and the Italian cybersecurity sector. The first concerned an Italian...
RHC Dark Lab - July 11, 2025
AI Agents: The Intelligent Revolution Explained to Everyone Cyber News

AI Agents: The Intelligent Revolution Explained to Everyone

Imagine a digital assistant who not only answers your questions, but also acts for you, plans strategies, learns from its...
Marcello Politi - July 10, 2025
Is the end of state-led cyberspace invasions coming? The 56-page draft prepared by the UN Cyber News

Is the end of state-led cyberspace invasions coming? The 56-page draft prepared by the UN

The eleventh final session of the Open-Ended Working Group (OEWG) on cybersecurity opened at the United Nations Headquarters in New...
Sandro Sana - July 9, 2025
Claude Shannon: Father of Cryptography and Founder of the Information Age Cybercrime

Claude Shannon: Father of Cryptography and Founder of the Information Age

Whoever has as a mission, to deal with computer security and therefore also with cryptography, must necessarily pass through the...
Carlo Denza - July 8, 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE