Ultime news
AI in the Hands of Criminal Hackers: The Game Has Changed, and We’re at a Disadvantage
Samsung under attack in Italy: phones held hostage by ransomware
PureVPN on Linux: Researcher Finds Security and Anonymity Issues
Ally Solos AI Glasses for the Visually Impaired: Autonomy and Safety
When Unicode Becomes a Weapon and Your Email Betrays You, Inboxfuscation Arrives
Scattered Spider: The teenage genius who hacked Las Vegas is in custody.
Creeper & Reaper: The story of the first worm and the first antivirus software.
Redazione RHC - July 9th, 2025
Businesses are going bankrupt due to ransomware. Small and medium-sized businesses, beware!
Redazione RHC - July 9th, 2025
What is ransomware? Let’s explore how RaaS works and what it means.
Redazione RHC - July 9th, 2025
The Shellter Elite suite used by Red Teams to bypass EDRs is now being used by cybercrime
Redazione RHC - July 9th, 2025
Is the end of state-led cyberspace invasions coming? The 56-page draft prepared by the UN
Redazione RHC - July 9th, 2025
Claude Shannon: Father of Cryptography and Founder of the Information Age
Carlo Denza - July 8th, 2025
Who are the most famous hackers in history?
Redazione RHC - July 8th, 2025
Underwater cables and the “cyber war of the seabed”. Between control, geopolitics and technology
Redazione RHC - July 8th, 2025
Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam
Redazione RHC - July 8th, 2025
A new Poc Exploit allows Privilege Excalation on Linux using the udisksd daemon
Redazione RHC - July 8th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeCheck Point Research recently discovered a sophisticated phishing campaign orchestrated by KONNI , a threat group linked to North Korea . Historically focused on diplomatic targets in South Korea, the malicious actor has now expanded…
CybercrimeAttackers are exploiting a previously patched critical FortiGate authentication flaw (CVE-2025-59718) through a patch bypass method to breach protected firewalls, as Fortinet customers are experiencing. Fortinet reportedly plans to soon release FortiOS versions 7.4.11, 7.6.6,…
CybercrimeA critical zero-day remote code execution (RCE) vulnerability, identified as CVE-2026-20045, has been discovered by Cisco and is being actively exploited in active attacks. Cisco has urged immediate patching, and its Product Security Incident Response…
innovationIn the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and Hack The Box (HTB) for…
CybercrimeYesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald’s on their Data Leak Site (DLS) . From the gang’s post, the cybercriminals claim to have 861GB of data exfiltrated from the company’s…











