Redazione RHC - December 23rd, 2025
According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective...
Redazione RHC - December 23rd, 2025
Activists and hackers at Anna's Archive have reportedly combed nearly the entire music library of the largest streaming service, Spotify. They claim to have collected metadata for 256 million tracks...
Manuel Roccon - December 23rd, 2025
The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies...
Redazione RHC - December 23rd, 2025
A Ukrainian man implicated in a series of ransomware attacks has been found guilty in the United States. These cybercrimes affected companies in several countries, including the United States, Canada,...
Redazione RHC - December 23rd, 2025
As we always report on these pages, nations are pushing for the development of domestic software and hardware devices, that is, technologies developed within the nation that are more easily...
Redazione RHC - December 23rd, 2025
A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data...
Redazione RHC - December 23rd, 2025
Texas Attorney General Ken Paxton has charged five major television manufacturers with illegally collecting user data using automatic content recognition (ACR) technology to record what owners watch. The charges concern...
Redazione RHC - December 23rd, 2025
Researchers at Check Point, a pioneer and global leader in cybersecurity solutions, have discovered a phishing campaign in which attackers pose as file-sharing and electronic signature services to send financially-themed...
Redazione RHC - December 22nd, 2025
The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption...
Redazione RHC - December 22nd, 2025
According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers...