Ultime news
Italy under DDoS attack by pro-Russian NoName057(16)? Few disruptions.
Google Chrome: Urgent patch for exploited 0day. Critical vulnerabilities fixed.
Phishing with style! Cybercriminals attach superhero GIFs to malware.
Will this latest article “against” ChatControl be absolutely useless?
Azure Functions in the Spotlight: Legitimate Libraries Used for DLL Sideloading
Linux Hit by Sindoor Dropper: Highly Obfuscated Infection Chain
Connected and Vulnerable: How to Secure OT and ICS in 2025
Redazione RHC - June 22nd, 2025
Darkcloux 3.0 is here: Securonis Linux becomes more secure (and more extreme) than ever
Redazione RHC - June 22nd, 2025
Urobot watches you while you pee (but it’s for your own good)
Redazione RHC - June 22nd, 2025
Smart TV or Living Room Spies? Here’s How They’re Monitoring You
Redazione RHC - June 22nd, 2025
Massive Windows Crash: The OpenVPN Flaw That Can Knock Out Infrastructures
Redazione RHC - June 22nd, 2025
Android Under Attack: Godfather Malware Now Uses Virtualization to Fool Everyone
Redazione RHC - June 22nd, 2025
ChatGPT is Shutting Down Our Brains! Alarming MIT Research Shows Mental Decay
Redazione RHC - June 22nd, 2025
AKIRA emergency report: the ransomware that is breaching Italy
RHC Dark Lab - June 22nd, 2025
RHC GhostSec interview: hacktivism in the shadows of terrorism and cyber conflict
RHC Dark Lab - June 12th, 2025
Group-IB contributes to INTERPOL’s Operation Secure, leading to the arrest of 32 suspects linked to information stealer malware in Asia
Redazione RHC - June 11th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeA critical zero-day remote code execution (RCE) vulnerability, identified as CVE-2026-20045, has been discovered by Cisco and is being actively exploited in active attacks. Cisco has urged immediate patching, and its Product Security Incident Response…
innovationIn the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and Hack The Box (HTB) for…
CybercrimeYesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald’s on their Data Leak Site (DLS) . From the gang’s post, the cybercriminals claim to have 861GB of data exfiltrated from the company’s…
CybercrimeA group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…
CybercrimeResearchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…











