Ultime news
Cephalus is coming! The ransomware group that attacks via DLL replacement.
WhatsApp and Apple in emergency: DNG bug allows remote control without clicking
Stealerium and Phantom: How Open-Source Infostealers Are Taking the World by storm
The largest pirate sports streaming network has been shut down.
Criticism of XChat: The new encrypted messaging service is no good
CrowdStrike Threat Hunting Report 2025: Cybercriminals Use AI for Large-Scale Attacks
BlackByte: The Return of the Gang after a few months of inactivity
Pietro Melillo - June 24th, 2024
Presumed Cyber Attack on Zerto: Not for Financial or Espionage Purposes but for Political Reasons
Pietro Melillo - June 24th, 2024
Lockbit 3.0 Claims Attack on Federal Reserve: 33 Terabytes of Sensitive Data Allegedly Compromised
Pietro Melillo - June 24th, 2024
Anubi, the EDR for your malware and network security
Andrea Cavallini - June 17th, 2024
PRAISE TO VX-UNDERGROUND – The hack-library turns 5!
Alessio Stefan - May 19th, 2024
RHC interviews Professor Andrea Morello from the ARC Centre of Excellence for Quantum Computation at the University of New South Wales in Australia
Tara Lie - May 14th, 2024
ClamAV and signatures generation
Andrea Cavallini - May 2nd, 2024
Loki, starting IOC discovering
Andrea Cavallini - May 2nd, 2024
Flipping pages, from userland to godmode
Sergio Corpettini - April 6th, 2024
Likely Iranian-Origin Phishing Attack: New Threat to Online Security in Italy!
Davide Cavallini - April 4th, 2024
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
innovationIn the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and Hack The Box (HTB) for…
CybercrimeYesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald’s on their Data Leak Site (DLS) . From the gang’s post, the cybercriminals claim to have 861GB of data exfiltrated from the company’s…
CybercrimeA group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…
CybercrimeResearchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…
CybercrimeElon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…











