Ultime news
Elon Musk unveils Colossus II, the one-gigawatt AI supercomputer
Vulnerability in Windows RPC protocol: Spoofing and impersonation attacks reported
Patchwork Launches Spear-Phishing Campaign Against Turkish Defense
Hackers don’t want to save you: they want to erase you.
The Story of Microsoft Solitaire: From Launch with Windows 3.0 to Enduring Success
Removing private data from AI models? Now you can without accessing the original datasets.
Patch Chaos: Windows 11 Update Breaks PDF Printing
Redazione RHC - July 3rd, 2025
The symbol of the hacker community: today we talk about the Glider.
Redazione RHC - July 3rd, 2025
The hacker group LOpht predicted the future of the Internet in 1998, but the US didn’t listen to them.
Redazione RHC - July 3rd, 2025
Linux Pwned! Privilege Escalation on SUDO in 5 seconds. HackerHood tests the CVE-2025-32463 exploit
Redazione RHC - July 2nd, 2025
North Korean Hackers on the Payroll: How Companies Paid Salaries to North Korean IT Specialists
Redazione RHC - July 2nd, 2025
The Story of Open Source: A Success Story of Humankind
Massimiliano Brolli - July 2nd, 2025
Do you really know what Hacktivism means? It’s a “special message of hope!”
Redazione RHC - July 2nd, 2025
The History of FreeBSD
Redazione RHC - July 2nd, 2025
HoneyPLC: the new honeypot that revolutionizes the defense of industrial plants
Redazione RHC - July 2nd, 2025
Italian Scientists: Federico Faggin, the Italian who invented the microprocessor.
Redazione RHC - July 1st, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeAttackers are exploiting a previously patched critical FortiGate authentication flaw (CVE-2025-59718) through a patch bypass method to breach protected firewalls, as Fortinet customers are experiencing. Fortinet reportedly plans to soon release FortiOS versions 7.4.11, 7.6.6,…
CybercrimeA critical zero-day remote code execution (RCE) vulnerability, identified as CVE-2026-20045, has been discovered by Cisco and is being actively exploited in active attacks. Cisco has urged immediate patching, and its Product Security Incident Response…
innovationIn the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and Hack The Box (HTB) for…
CybercrimeYesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald’s on their Data Leak Site (DLS) . From the gang’s post, the cybercriminals claim to have 861GB of data exfiltrated from the company’s…
CybercrimeA group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…











