Ultime news
Uncovering Dark AI: The Truth Behind Crime-as-a-Service Chatbots
AI-Generated Mac Malware: SimpleStealth Threatens User Security
Linus Torvalds on AI Coding: ‘It’s Just Another Tool’
The Future of Tech: Sovereignty, Security, and Cloud Control
Internet Shutdowns Cost $19.7B in 2025, Sophisticated Censorship Rises
Doom on a Smart Pressure Cooker: The Ultimate IoT Hack
PS5 BootROM Key Leaked, Sony’s Security Compromised
Redazione RHC - January 5th, 2026
China Achieves Quantum Error Correction Breakthrough with Microchip
Redazione RHC - January 5th, 2026
Critical GNU Wget2 Vulnerability Exposes Users to File Overwrite Attacks
Redazione RHC - January 5th, 2026
Windows 11 Performance Test: Surprising Results with Windows 8.1
Redazione RHC - January 5th, 2026
PentestAgent: Revolutionizing Penetration Testing with AI-Powered Tools
Redazione RHC - January 5th, 2026
US Treasury Removes Sanctions on Intellexa Spyware Developers
Redazione RHC - January 5th, 2026
Rue Language: Revolutionizing System Programming with AI
Redazione RHC - January 5th, 2026
Password Security: The Impact of Human Behavior on Password Strength
Simone D'Agostino - January 4th, 2026
Potential Data Breach at Pickett USA Exposes Critical Energy Infrastructure
Redazione RHC - January 4th, 2026
Forensic Timeliner: Advanced Digital Forensics Tool for DFIR Analysis
Redazione RHC - January 4th, 2026
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeAttackers are exploiting a previously patched critical FortiGate authentication flaw (CVE-2025-59718) through a patch bypass method to breach protected firewalls, as Fortinet customers are experiencing. Fortinet reportedly plans to soon release FortiOS versions 7.4.11, 7.6.6,…
CybercrimeA critical zero-day remote code execution (RCE) vulnerability, identified as CVE-2026-20045, has been discovered by Cisco and is being actively exploited in active attacks. Cisco has urged immediate patching, and its Product Security Incident Response…
innovationIn the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and Hack The Box (HTB) for…
CybercrimeYesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald’s on their Data Leak Site (DLS) . From the gang’s post, the cybercriminals claim to have 861GB of data exfiltrated from the company’s…
CybercrimeA group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…











