Ultime news
SOAP Vulnerability in .NET Framework Allows Remote Code Execution
CVE-2025-55182 React Server Components Vulnerability Exploited
Top 25 Software Vulnerabilities 2025: MITRE CWE Ranking and Security Tips
The Future of Work: 4-Day Week with AI and Tech Advances
ARTEMIS Leads in AI-Powered Pentesting, Outperforming Human Experts
Apple Patches Critical WebKit Vulnerabilities in iOS Update
LLM-Powered Malware: The Future of Autonomous Cyber Threats
Redazione RHC - December 9th, 2025
Intellexa Exploits Zero-Day Vulnerabilities with Spyware
Redazione RHC - December 8th, 2025
Malaysia Cracks Down on Bitcoin Mining Thefts
Redazione RHC - December 8th, 2025
Australia Bans Social Media for Under 16s: What You Need to Know
Redazione RHC - December 8th, 2025
Palo Alto Networks VPN Vulnerability Exploited by Hackers
Redazione RHC - December 8th, 2025
US Brothers Accused of Destroying 96 Databases with AI
Redazione RHC - December 8th, 2025
US Seizes Phishing Site Used by Myanmar Scammers to Steal Millions
Redazione RHC - December 8th, 2025
Digital Literacy in Schools: The Key to Unlocking Students’ Potential
Inva Malaj - December 8th, 2025
OSINT Investigation: Uncovering Digital Evidence
Alexandro Irace - December 8th, 2025
Europe’s Digital Sovereignty: The Risks of Relying on Non-European Tech
Redazione RHC - December 7th, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…











