Ultime news
He arrived in America with $200 and ended up in a reformatory: today he controls 90% of the world’s AI
The Thin Red Line of Criminal Liability in Cybersecurity
China Bans Western Cybersecurity Software, Cites Security Fears
Vulnerabilities discovered in Foxit PDF Editor, Epic Games Store, and MedDream PACS
Larva-25012 Proxyjacking Campaign Targets South Korea with Notepad++ Malware
OpenAI API Logs Vulnerability Exposed: Data Exfiltration Risk
LastPass Phishing Attack: Protect Your Master Password Now
Redazione RHC - January 22nd, 2026
Zoom Security Alert: Critical Vulnerability in Node MMR Devices
Redazione RHC - January 22nd, 2026
LockBit 5.0 Ransomware: New Threats and Advanced Tactics
Redazione RHC - January 22nd, 2026
Fortinet FortiOS Vulnerability Exploited: CVE-2025-59718 Patch Bypass
Redazione RHC - January 22nd, 2026
Cisco Zero-Day Vulnerability CVE-2026-20045 Actively Exploited
Redazione RHC - January 22nd, 2026
Cybersecurity in Local Administrations: The Hidden Risk
Roberto Villani - January 22nd, 2026
UK Organizations Hit by Russia-Backed DDoS Attacks
Redazione RHC - January 22nd, 2026
GitLab Security Update Fixes Critical Vulnerabilities CVE-2026-0723
Redazione RHC - January 21st, 2026
Critical Telnetd Vulnerability in GNU InetUtils Allows Root Access
Redazione RHC - January 21st, 2026
Red Hot Cyber and Hack The Box: together for the CTF at the RHC 2026 conference
Redazione RHC - January 21st, 2026
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CyberpoliticsItaly has confirmed itself as one of the main targets of the DDoS attack campaign carried out by the hacktivist group NoName057(16) . According to what was declared directly by the collective, our country has…
innovationThe question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry has repeatedly attempted to provide a concrete answer, without ever reaching a definitive solution. From…
CybercrimeThe BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by Picus Security details the group’s…
CybercrimeA study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The study’s results were published by…
CybercrimeA new malware campaign has emerged in the macOS world, one that relies not on sophisticated exploits, but on good old-fashioned social engineering. It’s powered by the MacSync malware, distributed using the ” malware-as-a-service ”…











