Ultime news
Instagram Data Leak Exposes 17.5 Million Users on Dark Web
Phishing Emails Mimic Internal Comms via Microsoft 365 Spoofing
Lovense Emily AI Doll: Revolutionary Companion at CES 2026
HPE OneView Critical Vulnerability Exploited: Update Now to Prevent Attacks
Undertow Vulnerability CVE-2025-12543 Exposes Java Ecosystem to Critical Security Risks
The Revolutionary iPhone Launch: A Game-Changing Moment in Tech History
Password Security: The Impact of Human Behavior on Password Strength
Simone D'Agostino - January 4th, 2026
Potential Data Breach at Pickett USA Exposes Critical Energy Infrastructure
Redazione RHC - January 4th, 2026
Forensic Timeliner: Advanced Digital Forensics Tool for DFIR Analysis
Redazione RHC - January 4th, 2026
Google Unveils Nano Banana 2 Flash for Rapid Image Generation
Redazione RHC - January 4th, 2026
Ancient Chinese Silk Loom: The World’s First Computer?
Redazione RHC - January 3rd, 2026
Neuralink’s Brain-Computer Implants to Revolutionize Human Life by 2026
Redazione RHC - January 3rd, 2026
Zero-Day Exploits on the Rise: How to Protect Your Network
Redazione RHC - January 2nd, 2026
Long-Lived Technologies: COBOL, C, SQL, and Legacy Systems
Redazione RHC - January 2nd, 2026
PollyPolymer Revolutionizes Robotics with 3D Printed Flexible Components
Redazione RHC - January 2nd, 2026
GlassWorm Malware Targets macOS via Open VSX Extensions
Redazione RHC - January 2nd, 2026
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
innovationIn the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and Hack The Box (HTB) for…
CybercrimeYesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald’s on their Data Leak Site (DLS) . From the gang’s post, the cybercriminals claim to have 861GB of data exfiltrated from the company’s…
CybercrimeA group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…
CybercrimeResearchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…
CybercrimeElon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…











