Ultime news
BitLocker in the crosshairs: stealth attacks via COM hijacking. Online PoC
From image theft to deepfakes: the new frontier of digital manipulation
The ChillyHell backdoor returns to threaten macOS systems.
Regulating out-of-office work: a best practice for organizations and beyond.
Apple introduces Memory Integrity Enforcement. Will this be the end of hacking?
Linux in Crisis: Rust Splits Community and Maintainers Leave
Stormous claims an attack on NASA
Pietro Melillo - October 9th, 2024
The Story Of Conti Ransomware – Origins and Evolution of the RaaS Model (Episode 1)
Alessio Stefan - September 30th, 2024
RHC Interviews Lynx Ransomware. The cyber-gang offering Pentest services ensuring privacy
RHC Dark Lab - September 23rd, 2024
Alleged SpaceX Database Breach Published on BreachForums
Pietro Melillo - September 21st, 2024
WhiteHouse.gov Data Breach: Threat Actors Leak Sensitive Information!
Redazione RHC - September 21st, 2024
RHC interviews Qilin Ransomware! “Let’s play fair and wait for a worthy opponent on the field”
RHC Dark Lab - September 19th, 2024
Navigating the future: a dialogue on human resilience and preservation
Alessandro Rugolo - September 5th, 2024
Cryptography at Risk: MIT develops a Quantum Algorithm to crack RSA.
Tara Lie - August 27th, 2024
Interview with Cesare Mencarini. A 17-year-old hacker who created a nuclear reactor in college
Massimiliano Brolli - August 26th, 2024
Arrest of Pavel Durov: Telegram Founder Detained in Paris
Pietro Melillo - August 25th, 2024
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
innovationIn the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and Hack The Box (HTB) for…
CybercrimeYesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald’s on their Data Leak Site (DLS) . From the gang’s post, the cybercriminals claim to have 861GB of data exfiltrated from the company’s…
CybercrimeA group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…
CybercrimeResearchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…
CybercrimeElon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…











