Ultime news
Red Hot Cyber and Hack The Box: together for the CTF at the RHC 2026 conference
Everest Ransomware Attacks McDonald’s, 861GB Data Stolen
ESXi Zero-Day Exploit: How to Protect Your VMware Environment
VoidLink Malware: AI-Generated Threat for Linux Systems
Google Fast Pair Vulnerability: WhisperPair Exposes Millions of Devices
Elon Musk Sues OpenAI for $134 Billion Over AI Betrayal
Red Hot Cyber and Hack The Box: together for the CTF at the RHC 2026 conference
Redazione RHC - January 21st, 2026
Everest Ransomware Attacks McDonald’s, 861GB Data Stolen
Redazione RHC - January 21st, 2026
ESXi Zero-Day Exploit: How to Protect Your VMware Environment
Redazione RHC - January 20th, 2026
VoidLink Malware: AI-Generated Threat for Linux Systems
Redazione RHC - January 20th, 2026
Google Fast Pair Vulnerability: WhisperPair Exposes Millions of Devices
Redazione RHC - January 19th, 2026
Elon Musk Sues OpenAI for $134 Billion Over AI Betrayal
Redazione RHC - January 19th, 2026
Net-NTLMv1 Exploitation: Rainbow Tables for Modern Attacks
Redazione RHC - January 18th, 2026
Critical Vulnerability in Modular DS WordPress Plugin – Update Now
Redazione RHC - January 18th, 2026
Your paycheck is zero! Congratulations, someone answered the phone wrong
Redazione RHC - January 18th, 2026
Two Ukrainians Suspected in Black Basta Ransomware Attacks
Redazione RHC - January 17th, 2026
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
innovationIn the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and Hack The Box (HTB) for…
CybercrimeYesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald’s on their Data Leak Site (DLS) . From the gang’s post, the cybercriminals claim to have 861GB of data exfiltrated from the company’s…
CybercrimeA group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…
CybercrimeResearchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…
CybercrimeElon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…











