Ultime news
Chinese Cyber Spies Use Brickstorm Malware to Infiltrate Critical Networks
Splunk Enterprise Vulnerability: CVE-2025-20386 and CVE-2025-20387
Apache HTTP Server Update Fixes Critical Security Vulnerabilities
Cyber Insurance: Why Basic Hygiene Matters
Meta AI WhatsApp Investigation
Gulf States’ Digital Transformation: A New Era of Innovation and Security
Microsoft Blocks KMS38 Activation Method for Windows 10 and 11
Redazione RHC - November 23rd, 2025
Future prospects for computer science and technology graduates
Redazione RHC - November 23rd, 2025
ATMs targeted! Cybersecurity experts reveal an attack campaign targeting ATMs.
Redazione RHC - November 23rd, 2025
Google Gemini Improves AI-Generated Image Verification
Redazione RHC - November 23rd, 2025
“We Want to Hack You Again!” NSO Group Rejects WhatsApp’s Pegasus Lawsuit
Redazione RHC - November 22nd, 2025
Oracle under attack: Pre-auth RCE vulnerability discovered that compromises entire systems
Redazione RHC - November 22nd, 2025
CrowdStrike Insider Fired for Providing Sensitive Data to Criminal Hackers
Redazione RHC - November 22nd, 2025
Sysmon will finally be integrated into Windows 11 and Windows Server 2025 in 2026
Redazione RHC - November 22nd, 2025
Sneaky2FA: The phishing scam that steals credentials with browser-in-the-browser attacks
Redazione RHC - November 22nd, 2025
TamperedChef: Malware via Fake App Installers
Redazione RHC - November 21st, 2025
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeAn ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…
CybercrimeThere’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…
CybercrimeWhen it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…
CybercrimeAccording to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…
VulnerabilityThe following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…











