Ultime news
The DGX Spark is on sale. An AI supercomputer in the palm of your hand!
The Poison of Curiosity and the Antidote of Cyber Hygiene: A Social Engineering Recipe
LatentBreak: A New Attack Method for Language Models
Alert: Thousands of Italian websites at risk! 526,000 sites and 6,500 databases for sale on the Darkweb
F5 Suffers Security Breach: Source Code and Sensitive Data Stolen
Software Update Renders Jeep 4xe Vehicles Unusable
From Commodore 64 to GitHub! Gates and Allen’s BASIC goes open source after 48 years.
Redazione RHC - September 4th, 2025
New Wave of Quishing Attacks: Innovative Tactics from Cybercriminals
Redazione RHC - September 4th, 2025
Netshacker: Retrogaming e Hacking Reale su Commodore 64
Marcello Filacchioni - September 4th, 2025
NotDoor Arrives: APT28’s Microsoft Outlook Backdoor
Redazione RHC - September 4th, 2025
Trump meets with all the AI tech leaders at the White House. Elon Musk is notably absent!
Redazione RHC - September 4th, 2025
Red Hot Cyber Conference 2026: Sponsorships Open for the Fifth Edition in Rome
Redazione RHC - September 4th, 2025
Hexstrike AI unleashes chaos! Zero-days exploited in record time
Redazione RHC - September 4th, 2025
Microsoft Introduces POML for Orchestrating LLM Prompts
Redazione RHC - September 4th, 2025
CISO vs. DPO: Collaboration or Cold War in Business?
Stefano Gazzella - September 4th, 2025
Revolutionize security models with the Unified SASE framework
Redazione RHC - September 4th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerability in the Linux kernel has caused…

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worrying security flaw in its…











