Ultime news
FreeBSD 15.0: Discover the Power of This Unix-like Operating System
Cloudflare Blocks AI Bots: The Future of Internet Economy at Stake
React2Shell Vulnerability: 8.7M Servers at Risk – CVE-2025-55182
Cloudflare Just Broke the Internet… Again. Centralization Risks Exposed
Chinese Cyber Spies Use Brickstorm Malware to Infiltrate Critical Networks
Splunk Enterprise Vulnerability: CVE-2025-20386 and CVE-2025-20387
Windows Server Vulnerability Exploited: ShadowPad Malware Deployed
Redazione RHC - November 24th, 2025
Salesforce Data Breach: ShinyHunters Hack Gainsight Integration
Redazione RHC - November 24th, 2025
BadAudio Discovered: Ghost Malware Used by APT24 for Three Years Undetected
Redazione RHC - November 24th, 2025
Satoshi Nakamoto’s Net Worth Drops 34% as Cryptocurrency Crash
Redazione RHC - November 24th, 2025
Cyberattack on Eurofiber France: Find out what happened
Redazione RHC - November 24th, 2025
From Risk to Resilience: How Veeam Protects Your Supply Chain from Disruptions
Redazione RHC - November 24th, 2025
When the Cloud Falls: How a Small Mistake Brought the Global Internet to Its Knees
Gaia Russo - November 24th, 2025
Father and son break world speed record with homemade drone
Redazione RHC - November 23rd, 2025
Microsoft Blocks KMS38 Activation Method for Windows 10 and 11
Redazione RHC - November 23rd, 2025
Future prospects for computer science and technology graduates
Redazione RHC - November 23rd, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…
CybercrimeAccording to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…
VulnerabilityThe following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…











