Ultime news
Apache Jackrabbit RCE Vulnerability: Exploitation in Progress, Update Now
Italian call center companies leave all audio recordings online
Tasting the Exploit: HackerHood testa l’exploit di WINRAR CVE-2025-8088
Hackers bypass the most stringent WAFs with a single line of JavaScript! The moral? Always write securely.
Thermoptic: The Tool for Bypassing Fingerprint-Based Lock Systems
NightshadeC2, the new botnet that uses unconventional methods to bypass protection
Threat Actors 888 claimed a compromise at Credit Suisse
RHC Dark Lab - June 27th, 2024
Cyber catastrophe in sight? The new Bug on MOVEit has an Online PoC Exploit
RHC Dark Lab - June 27th, 2024
KillSec Announces New Ransomware-as-a-Service (RaaS) Platform
RHC Dark Lab - June 26th, 2024
UNZIPPED DATA – LEVI STRAUSS COMPROMISED ACCOUNTS
RHC Dark Lab - June 26th, 2024
LockBit: The Bluff of Double Extortion Against the Federal Reserve
RHC Dark Lab - June 26th, 2024
Xehook Stealer: The Rise and Sale of a Formidable Stealer Malware
Pietro Melillo - June 26th, 2024
DataLeak Microsoft: 4GB of Microsoft PlayReady Code Made Public!
Pietro Melillo - June 26th, 2024
Linux Kernel UAF 0-day Vulnerability on sale in the Dark Web
RHC Dark Lab - June 25th, 2024
WordPress: Five Plugins Found with Malicious Code
Pietro Melillo - June 25th, 2024
Julian Assange Free! Freedom Reclaimed After Five Years of Detention
Pietro Melillo - June 25th, 2024
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
innovationIn the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and Hack The Box (HTB) for…
CybercrimeYesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald’s on their Data Leak Site (DLS) . From the gang’s post, the cybercriminals claim to have 861GB of data exfiltrated from the company’s…
CybercrimeA group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…
CybercrimeResearchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…
CybercrimeElon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…











