Ultime news
PuTTY Under Siege: Hackers Exploit Popular Client for SSH Attacks
OAuth Device Code Phishing: New Attack Vector for Account Takeover
DIG AI: The Dark Web’s New AI Tool for Cybercrime
TikTok Accused of Illegally Tracking Users’ Data Across Apps
Naftali Bennett Telegram Account Hacked in Israel Politics
Cisco Secure Email Gateway Vulnerability Exploited: Act Now
Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk
Redazione RHC - December 19th, 2025
Google and Apple Embrace Interoperability with Android iOS Data Transfer
Redazione RHC - December 19th, 2025
Ink Dragon Targets Europe: Exploiting SharePoint and IIS Vulnerabilities
Sandro Sana - December 19th, 2025
Bypassing AI Safety: EchoGram Exposes Vulnerabilities in LLM Defenses
Redazione RHC - December 19th, 2025
E-Note Shutdown: Major Blow to Cybercrime and Ransomware
Redazione RHC - December 19th, 2025
French Police Arrest Suspect in Cyberattack on Interior Ministry
Redazione RHC - December 18th, 2025
Google Unveils Gemini 3 Flash AI Model, Rivals OpenAI GPT-5.2
Redazione RHC - December 18th, 2025
Rise of AI Degrees: Students Shift from Computer Science to AI
Redazione RHC - December 18th, 2025
SonicWall SMA1000 Vulnerability: Critical Security Patch Released
Redazione RHC - December 18th, 2025
HPE OneView Vulnerability CVE-2025-37164: Critical Security Update Required
Redazione RHC - December 18th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…











