Ultime news
Perl returns to the top 10 most popular programming languages
Hacker Scattered LAPSUS$ Hunters: Unauthorized Access to Google LERS
Chat Control: Between hunting down illegal channels and cracking down on freedom and privacy
An e-cigarette becomes a web server. And let hacking be!
Critical Linux Vulnerability: 0-Click N-Days Exploit Allows Remote Code Execution
Security alert for AI servers: thousands are at risk
Interviewing ChatGPT: the AI that feels human, to its Asperger’s users.
Ashleigh Crause - March 7th, 2025
Akira Ransomware: The New Threat Using Webcams as Entry Points
Pietro Melillo - March 7th, 2025
Possible breach at Ukraine’s Ministry of Foreign Affairs: the Qilin Ransomware group claims responsibility for the attack
Pietro Melillo - March 7th, 2025
A New Dark Actor Enters the Criminal Underground. Discovering Skira Ransomware
Pietro Melillo - March 7th, 2025
Analysis of Recorded Future’s CVE Report – February 2025
Sandro Sana - March 5th, 2025
Alleged Cyber Attack on Dana Pensiun Bank Mandiri
Redazione RHC - March 1st, 2025
Microsoft presents Majorana 1: The Quantum Processor Promising to Reshape the Future
Tara Lie - February 24th, 2025
Linkc Ransomware: The New Cybercriminal Group Targeting Artificial Intelligence Data
Pietro Melillo - February 20th, 2025
The UK’s Digital Crackdown: how the government is using our online habits to breach human rights
Ashleigh Crause - February 12th, 2025
Ransomware Gangs weaponize Windows Defender Application Control (WDAC) to disable EDR products.
Alex Necula - January 13th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
innovationIn the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and Hack The Box (HTB) for…
CybercrimeYesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald’s on their Data Leak Site (DLS) . From the gang’s post, the cybercriminals claim to have 861GB of data exfiltrated from the company’s…
CybercrimeA group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…
CybercrimeResearchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…
CybercrimeElon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…











