Ultime news
Prelude to Compromise: Targeted Scans of Cisco ASA Surge
tls-preloader introduced: the library that disables TLS certificate verification
Rogue TLS certificates discovered for Cloudflare’s DNS service 1.1.1.1
Urgent update for Google Chrome: Use-after-free in the Serviceworker component
Cyberstorage: Italian IT Managers’ Response to Ransomware
The Gentlemen Ransomware: An Emerging Dark Web Threat Analysis
OpenSSH: An RCE run as Root puts 14 million instances on Linux at risk
Sandro Sana - July 2nd, 2024
Possible Data Breach of the Internal Security Operations Command (ISOC)
Pietro Melillo - July 1st, 2024
Bulgarian Hacker “Emil Külev” Arrested
Pietro Melillo - July 1st, 2024
Cybercriminals exploit ARC popularity to spread Poseidon Malware : Mac users are the target!
Raffaela Crisci - July 1st, 2024
Possible Data Breach Affecting TÜV Rheinland AG
Pietro Melillo - July 1st, 2024
Juniper Networks Releases Security Updates for a Critical 10.0 Vulnerability
Pietro Melillo - July 1st, 2024
Allegedly Data Breach: Kemenkumham Email Credentials Compromised
Pietro Melillo - July 1st, 2024
Coinbase USA: Threat Actor Claims to Sell Database of 600,000 Users
Pietro Melillo - July 1st, 2024
A Brief History of Artificial Intelligence: From Alan Turing to Generative AI
Redazione RHC - June 30th, 2024
The Virginia Department of Elections database may have been hacked and is online on the dark web
Pietro Melillo - June 30th, 2024
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
innovationIn the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and Hack The Box (HTB) for…
CybercrimeYesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald’s on their Data Leak Site (DLS) . From the gang’s post, the cybercriminals claim to have 861GB of data exfiltrated from the company’s…
CybercrimeA group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…
CybercrimeResearchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…
CybercrimeElon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…











